You Can’t Protect Without Knowing What You Have: A Deep Dive into How to Leverage Complete Asset Visibility as the Foundation for Protecting Against Emerging Threats

Webinar Registration

There have been nearly 20,000 Common Vulnerabilities and Exposures (CVE) recorded this year, putting a heavy burden on you to assess, identify, analyze, prioritize, track, and remediate pertinent vulnerabilities. And while there are specific operating system- and application-related CVEs you’re definitely looking for, the increase in the number of CVEs only provides threat actors with more entry points, making it imperative that every vulnerability that can possibly be mitigated, should be.

So, the question becomes where should you start?

The simple answer is found by taking a detailed look at the hardware and software asset inventory within the organization. But, with so many variants of desktops, laptops, tablets, and applications, it’s possible that you may be thinking this only exacerbates the problem you already know you need to address.

How, then, do you leverage asset management to focus simply on your management of vulnerability risk within the organization?

In this Real Training for Free webcast, cybersecurity expert and Microsoft MVP, Nick Cavalancia takes my seat as he first discusses:

  • The role of assets and devices in your cybersecurity strategy
  • How vulnerability management relies on asset discovery
  • How threat actors use asset and vulnerability scanning and discovery to aid their cause

Nick will be joined by Justin Prince, Technical Advisor, Vulnerability Management at Rapid7 who will take a look at the core concepts and underlying technology of asset discovery and assessment approaches: how they work, when and why to use them, the pros/cons of each, and how they can be used together for the best results.

Using specific real-world examples of vulnerabilities and susceptible services including Hafnium, ProxyOracle, RDP, SMB, and Telnet, to demonstrate workflows for discovering, measuring, and responding to risk.

This Real Training for Free event will be jam packed with technical detail and real-world application. Register today!

First Name:   
Last Name:   
Work Email:  
Job Title:  

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.



Additional Resources