Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
- This topic has 1 reply, 1 voice, and was last updated 3 years, 2 months ago by .
Where do network discovery and vulnerability fit in terms of priority in a security program? I know every organization is going to be different but isn’t this something that should be happening no matter what? I talk with a lot of organizations who have no vulnerability management processes in place, yet they are all interested in cybersecurity. I would love to hear from some of the more seasoned InfoSec and Cyber risk management professionals on this.
You must be logged in to reply to this topic.