Sept. 27, 2022, 7:23 p.m. | SANS Institute

SANS Institute www.youtube.com

So we have some contextual information. You know the system criticality or if attackers are leveraging a certain vulnerability to access systems. Great. Now what do you do.

In this second part of the Vulnerability Management webcast series, join Jonathan (MGT516 co-author and SANS certified Instructor) as he discusses how contextual information can and should be used within your vulnerability management program. From those just starting out to a well established program, there will be something for everyone.

Part 1: …

sans sans institute

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Junior Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate Director, Operations Compliance and Investigations Management

@ Legend Biotech | Raritan, New Jersey, United States

Analyst, Cyber Operations Engineer

@ BlackRock | SN6-Singapore - 20 Anson Road

Working Student/Intern/Thesis: Hardware based Cybersecurity Training (m/f/d)

@ AVL | Regensburg, DE