Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Introduction
00:00 • 2min
Do You Have a Risk-Based VM Process?
01:47 • 3min
The First Step to Doing Vulnerability Management Correctly
04:26 • 3min
Is It a Crown Jewel?
07:09 • 2min
Is There Multiple Layers of Ownership Inside of Nucleus?
08:53 • 2min
Is Nucleus a Ticketing System?
11:06 • 2min
The Problem Isn't a Technical Problem, but a Process Problem
12:52 • 4min
Is There a Rechecking Story?
17:20 • 2min
How Do You Automate Ticket Issues?
19:11 • 2min
Why People Don't Want to Do Vulnerability Management?
20:53 • 3min
Can Custom Findings Be Used for Custom Vulnerabilities?
24:16 • 2min
What Are You Not Addressing in the VM Space?
26:15 • 4min
Do You Encourage Name and Shame?
30:08 • 2min
Scrum Teams Aren't Doing a Good Job.
32:23 • 2min
What Do You Think We're Doing Really Well?
34:44 • 3min
Is That a Threat Intelligence Feed?
37:53 • 2min
Is There a Risk in a Vulnerability?
39:38 • 4min
Can I Change the Component on the on the Score? Yes, Absolutely.
43:13 • 4min