Presenter Photo

In this on-demand webinar, join the internationally-recognized expert in security, privacy, cloud computing and identity management, Dan Blum, and learn how to:

  • Use and maintain asset risk profiles
  • Triage vulnerabilities and other risk issues
  • Use vulnerability intelligence in agile risk assessments to prioritize risk treatment
  • Tune VRM continuously by mapping threat intelligence to vulnerabilities on a strategic risk register