Intelligent CIO Middle East Issue 30 | Page 21

LATEST INTELLIGENCE THREAT-CENTRIC VULNERABILITY MANAGEMENT IT’S TIME FOR A SMARTER APPROACH: THREAT- CENTRIC VULNERABILITY MANAGEMENT Y our approach to vulnerability management may be putting your organisation at greater risk. Just dealing with vulnerabilities that a vendor said were ‘critical’ isn’t enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low-hanging fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn’t USE KNOWLEDGE OF YOUR NETWORK AND THE THREAT LANDSCAPE TO ALIGN REMEDIATION WITH YOUR BIGGEST RISKS be tagged as a high-priority in a purely vulnerability-centric approach. Threat-centric vulnerability management (TCVM) offers an innovative and smarter approach for your organisation’s vulnerability management programme that will remain effective even as the threat landscape evolves. TCVM takes into account the context of your environment, including each asset’s exposure and importance to your business, the details of your current vulnerabilities, your IT environment and real-time intelligence on available and active exploits. TCVM can tell if any instance of a vulnerability in your environment is already shielded by existing security controls and if not, whether urgent action is needed to prevent exploitation. With TCVM, you have enterprise-wide visibility into the current status of vulnerabilities and the intelligence to manage them effectively. You also have the ability to immediately identify issues and task the appropriate personnel or systems with addressing them. n Download whitepapers free from www.intelligentcio.com/me/whitepapers/ www.intelligentcio.com INTELLIGENTCIO 21