I would like to thank Ian Collins for the presentation discussing Managing Cyber Exposure.
The presentation discussed Asset Management, Risk Assessment and Risk Management.
The Asset Management involved everything from physical devices, to software and external information. Risk Assesment revolved around identifying vulnerablities and threats (risk = threat x vulnerability).
Risk Assesment categories discussed included; threat intelligence, vulnerabilities, business impact, and determining risk.
Risk Management reviewed the Vulnerability Management Cycle; Identify-Assess-Prioritize-Remediate-Validate.
Vulnerability Management Programs were also discussed in detail, particularly; vulnerability Identification, vulnerability assessments, remediation planning and remediation validation.