The increasing complexity of IT environments is stretching many vulnerability tools and frameworks beyond their effective range, creating dangerous, exploitable security gaps. This IT evolution necessitates a more adaptive, risk-based approach to vulnerability management. Dan Blum, Principal Consultant from Security Architects Partners, recommends that enterprises combine asset intelligence and vulnerability intelligence with holistic risk management processes to prioritize remediation activities.

In this on-demand webinar, join the internationally-recognized expert in security, privacy, cloud computing and identity management, Dan Blum, and learn how to:

  • Use and maintain asset risk profiles
  • Triage vulnerabilities and other risk issues
  • Use vulnerability intelligence in agile risk assessments to prioritize risk treatment
  • Tune VRM continuously by mapping threat intelligence to vulnerabilities on a strategic risk register
B in a circle

Dan Blum

Managing Partner and Principal Consultant, Security Architects

An internationally-recognized expert in security, privacy, cloud computing, and identity management, Dan Blum leads and delivers consulting projects such as: cloud security and privacy assessments, security program assessments, risk management framework reviews, and identity management architectures.

Formerly a Golden Quill award-winning VP and Distinguished Analyst at Gartner, Mr. Blum holds CISSP and Open FAIR certifications. He has participated in industry groups such as ISACA, FAIR Institute, the CSA, IDPRO, Kantara Initiative, and others.