10 Steps to Building an Effective Vulnerability Management Program

Derek A. Smith, Founder, National Cybersecurity Education Center

Derek A. Smith, Founder, National Cybersecurity Education Center

Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently the Director of Cybersecurity Initiatives for the National Cybersecurity Institute at Excelsior College, responsible to perform complex duties relating to the development and coordination of cyber initiatives at NCI. Formerly, he has worked for a number of IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He has also taught business and IT courses at several universities for over 20 years. Derek has served in the US Navy, Air Force and Army for a total of 24 years. He completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education.

About this Webinar

Building an effective vulnerability management program is critical to every organization, no matter the type. Businesses must understand how to effectively prevent cyber-attacks by eliminating weaknesses in their networks if they don’t want to end up on the nightly news. Whether the network consists of just a few connected computers or thousands of servers distributed around the world, this presentation will provide and explain ten steps you can use to make your vulnerability management program much more effective, or build a program if you don’t already have one. Join Cybersecurity Expert, Derek A.Smith where he will take you through his 10 steps for success and how to get started now. This webinar will help the responsible security professional:
  1. Identify all the assets needing protection
  2. Create an Asset Criticality Profile (ACP)
  3. Determine your organizations exposures and vulnerabilities
  4. Track your organizations realized, and unrealized relevant threats
  5. Provide a formula to determine your organizations risks
  6. Take corrective action if your risks a greater than your costs
  7. Create meaningful metrics and hold people accountable
  8. Identify and address compliance gaps
  9. Implement an automated vulnerability management system
  10. Convince management of the importance of investing in a vulnerability management program
This is a webinar you won't want to miss! Please come with questions!