Basics of Threat and Vulnerability Management
Session 4: Basics of Threat and Vulnerability Management
This session dives into the security-centric topics of threat management and vulnerability management, recognizing the different between the two concepts. With threat management, the Scorecard discusses information sources and prioritization of threat actors– adversaries seeking to do harm to your utility– and events of interest that may happen in your state, municipality, or across the electric sector. Vulnerabilities, on the other hand, are weaknesses in devices or systems that may be exploited by threats and need to be managed in a separate manner. This session discusses how to examine both and leverage the recommendations from the Scorecard platform.
Solving Cyber Risk
Connect With Us!
About The Hosts
Cyber risk is the peril of our generation, but organizations struggle to get actionable visibility to their risk. While technology can be part of the solution, it is not a silver bullet. Minimizing and managing cyber risk requires a comprehensive, continuous evaluation across processes, people, balance sheet controls, and technology.
Axio believes that everyone should have the means to solve their unique cyber risk challenges. We are a passionate team of cybersecurity, cyber risk, and business leaders who developed a unique and holistic methodology and software platform to deliver on that belief.
Our innovative and proprietary approach gives companies visibility to their cyber risk and cyber posture in a manner that enables the prioritization of investments to optimize the protection of their business, customers, and employees