Ken Goodwin, director of networking, Pittsburgh Supercomputing Center (PSC) presented “Building a vulnerability management workflow that works, and getting the buy-in to implement it,” on May 27 as part of the ResearchSOC webinar series.
Thanks to all who attended the virtual presentation “in-person.”
Links to the video and slides are now available >> (Scroll down to “Past webinars.”)
Abstract
Subscribing to a vulnerability identification or scanning service is great for network security. But how do you manage the vulnerability data and create a manageable and trackable workflow that doesn’t overwhelm staff? How do you measure progress? What questions should a higher education or research facility or project cybersecurity team ask themselves?
Leave a Reply