주문형 웨비나
How Can Risk-Based Vulnerability Management Help Prevent Ransomware Attacks?
- Risk-based Vulnerability Management
- Tenable Vulnerability Management
- Tenable Security Center
- Tenable Lumin
Strengthen your defenses by finding and fixing the most exploitable vulnerabilities first.
It’s not just phishing. Ransomware attackers frequently take advantage of unpatched vulnerabilities to exploit victims. In 2020, one of the most notable was CVE-2012-0158 – a vintage vuln that was a CISA top-10 most exploited from 2016-2019...
In this on-demand webinar we discuss how ransomware utilizes vulnerabilities; we also explore ways you can detect and prioritize the highest-risk vulnerabilities on your most critical assets, making it much harder for attackers to infect your organization with ransomware.
Topics covered include:
- Effectively identifying and prioritizing the highest-risk vulnerabilities in your environment
- The impact of asset criticality on your vulnerability management efforts
- Employing secure configurations and other safeguards to harden your environment
- Additional steps you can take to mitigate your risk to ransomware
Who should participate?
All infosec and IT professionals responsible for defending against ransomware attacks are encouraged to attend.
지금 등록하고 주문형 웨비나를 시청하십시오.
발표자

Alaina Clark
Assistant Director for Stakeholder Engagement, Cybersecurity and Infrastructure Security Agency (CISA)

Errol Weiss
Chief Security Officer, Health ISAC (H-ISAC)

Kevin Flynn
Tenable 선임 제품 마케팅 관리자

Sam Farnan
Intelligence Analyst, Multi-State ISAC (MS-ISAC)

Valecia Stocchetti
Senior Cybersecurity Engineer, Center for Internet Security (CIS)