Vulnerability Management Challenges and Best Practices Revealed

Vulnerability Management Challenges and Best Practices Revealed

 

Available On Demand
Duration 60 Minutes
Speakers
Jim Frey
VP Research, Network Management
Enterprise Management Associates
Jim Frey
Jim has 24 years of experience in the computing industry developing, deploying, managing, and marketing software and hardware products, with the last 18 of those years spent in network management, straddling both enterprise and service provider sectors. At Enterprise Management Associates, Jim is responsible for the Network Management practice area.
Chris Meenan
Senior Product Manager
IBM Security Systems
Chris Meenan
Chris Meenan is a Senior Product Manager working on the QRadar Security Intelligence Product within the IBM Security division. He has over 10 years experience in product management and been involved in developing, managing, releasing and selling software products for over 20 years. Chris has a extensive market, domain, and customer knowledge in IT Security, Customer Relationship Management and Telecom OSS solutions. Chris holds a 1st Honours degree in Physics, and has a PhD in Mobile Satellite communications.

During this webinar, IBM Security Systems will discuss the issues and obstacles many encounter as they attempt to identify and prioritize security risks and exploitable vulnerabilities. They will also share details on the newest member of the QRadar Security Intelligence Platform, and how it can help close the gaps and eliminate inefficiencies often associated with point solutions. Security Systems experts will explain how QRadar Vulnerability Manager's seamless integration and automated operation leverages the QRadar infrastructure to consolidate systems, reduce the scan data load, and provide unparalleled visibility into an organization's threat profile.

Attend to discover:

  • How security teams can move from a reactive to proactive security strategy
  • Methods for determining the magnitude and severity of risks and vulnerabilities across your organization
  • Importance of an integrated approach for turning a sea of vulnerabilities into a swimmable lakeĀ 
  • How enterprise visibility to all sources of vulnerability data is the key to success
Already a member? Login