How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them
September 2012 • Podcast
Art Manion, Julia H. Allen
In this podcast, Greg Crabb explains how CERT-RMM can be used to establish and meet resilience requirements for a wide range of business objectives.
Listen
Abstract
Deploy vulnerability exploit prevention and mitigation techniques to thwart attacks and manage the arms race.
Related Course