Key Takeaways
Key Takeaways
VULNERABILITY
MANAGEMENT
cybrary.it
Lesson 1.1: Introduction
PREREQUISITES
• Some familiarity with NIST Special Publications, NIST Risk Management Framework, and Patch
Management Lifecycle
SUPPLEMENTARY MATERIALS
• SP-800-534,800-37,800-137
information
TARGET AUDIENCE
• Do you have a basic understanding of vulnerability management but want to improve practices?
Learning
Objectives
1.What Vulnerability Management Is and How Executive Leadership Can
Improve Practices
• Vulnerability management involves identifying and mitigating security
weaknesses. Executive leadership can enhance practices by providing
resources, fostering security awareness, and promoting IT-security
collaboration.
1.What Patch Management Lifecycle Is and Its Importance to Daily
Business Practices
• The patch management lifecycle includes identifying, acquiring, testing, and
deploying patches. It is essential for daily operations as it mitigates
vulnerabilities and ensures system security.
1.How Executive Leadership Can Support IT and Security in
Lesson 1.2: What is Vulnerability
Management
What is Vulnerability Management?
this process?
limited resources effectively, ensuring that the most critical vulnerabilities are
firmware
Prioritization
environment
possible issues
Risk Response
collaboration, provide ongoing training, set measurable goals, and hold regular progress
meetings.
define the scope and objectives, select appropriate tools, develop processes and
Building a Team!
• Systems Administration
• Network Administrator/Engineer
VulnMgmt Program
VulnMgmt Maturity
Program?
responsibilities?
program
Management
organization
VulnMgmt Maturity
Management Program?
• Team
as well
to protect
Lesson 1.5: Executive Leadership
Role
LEARNING OBJECTIVES
The CISO leads vulnerability management, supported by the CRO and CTO.
Smaller organizations may have informal processes, while larger ones require structured,
systematic approaches
A Risk Committee aligns vulnerability prioritization with the organization's risk appetite
An effective policy should be clear, comprehensive, regularly updated, and aligned with
Exec Management - Considerations
Organization Size
vulnerability management
control
vulnerabilities with
Security Policy
vulnerabilities)
premise vulnerabilities
TOOLS/
TECHNOLOGY
cybrary.it
Lesson 2.1: Patch Management
Software
What is Patch Management?
cybersecurity practices.
Learning
Objectives
1.Technical Skills Required to Build a Well-Rounded
Vulnerability Management Team
• Threat Detection and Analysis: Team members must
be adept at using tools like OpenVAS and Nessus to
detect and analyze vulnerabilities.
• Network Security: Understanding how to secure
networks, monitor for threats, and perform penetration
testing is essential.
• Incident Response: Knowledge of how to respond to
security incidents and remediate vulnerabilities quickly.
• Automation and Scripting: Skills in scripting
languages (e.g., Python, Bash) help automate security
2. An Analysis of Different Skills/Job Positions:
• Security Analyst: Focuses on monitoring systems for security breaches
and vulnerabilities. Analysts analyze vulnerability scans and suggest
remediation strategies.
• Security Engineer: Specializes in building and maintaining security
systems, ensuring that vulnerabilities are managed from a systems
architecture standpoint.
• Systems Administrator: Ensures that the servers and systems are
properly configured and regularly patched to reduce the risk of
vulnerabilities.
• Network Engineer: Focuses on the security of network infrastructures,
ensuring proper firewall configurations, VPN setups, and network
monitoring to prevent attacks.
• Security Leadership: Positions like CISO (Chief Information Security
Module 3
COMMON PROBLEMS IN
VULNMGMT
cybrary.it
Lesson 3.1: Patching Cycles
LEARNING OBJECTIVES:
software.
workflows.
efficiency.
PATCHING SCHEDULES:
LEARNING OBJECTIVES:
software.
refresh strategies.
SOFTWARE NEEDS
security risks.
vulnerability management.
maintenance.
funding.
TECHNICAL REFRESH
administrative overhead.
vulnerability management.
technologies.
institutions.
government contractors.
institutions.
government contractors.
management.
technologies.
• Adopt a holistic approach to vulnerability
LEARNING OBJECTIVES:
(CVSS)
or Critical.
Environmental metrics.
TENABLE VPR (VULNERABILITY PRIORITY
RATING)
• Combines machine learning and threat
security errors.
misconfigurations.
LEARNING OBJECTIVES
processes.
deployments.
critical.
• Be aware of vulnerability chaining, where multiple
remediation.
Module 4
SOLVING VULNMGMT
ISSUES
cybrary.it
Lesson 4.1: Aligning
Teams
How members of the Security team can work more efficiently
-To work more efficiently, the Security team should enhance communication, define roles, leverage
technology, provide ongoing training, collaborate with IT, establish incident response plans, create a
feedback loop, track performance metrics, allocate resources wisely, and prioritize tasks based on risk.
-Infrastructure and Security can combine efforts by collaborating closely to integrate security measures
into the design and management of systems, ensuring robust protection while maintaining operational
efficiency.
- Involve developers in the Security conversation by fostering a culture of collaboration through regular
cross-functional meetings, integrating security training into their workflows, and encouraging them to
-Executive leadership can partner with Security management by actively engaging in strategic security
How to align security teams in small or large organizations
-To align security teams in both small and large organizations, it’s essential to establish clear
communication channels, define common goals, and integrate security into the organizational
culture. Regular training sessions and collaborative meetings can help ensure everyone
understands their roles and responsibilities in maintaining security.
How IT teams can collaborate more effectively with Security
-IT teams can collaborate more effectively with security by adopting a shared framework for
incident response, fostering open communication, and utilizing collaborative tools for tracking
vulnerabilities and remediation efforts. Regular joint meetings can also help align priorities
and promote a proactive security posture.
How to improve security in code development
-To enhance security in code development, organizations should implement practices like
secure coding standards, regular code reviews, and automated security testing within the
development lifecycle. Encouraging developers to participate in security training can further
strengthen awareness and reduce vulnerabilities.
How Executive Leadership can improve vulnerability management
-Executive leadership can improve vulnerability management by prioritizing security in
organizational strategy, allocating adequate resources for security initiatives, and promoting a
culture of accountability. By regularly reviewing vulnerability assessments and involving key
stakeholders in decision-making, leaders can ensure vulnerabilities are effectively identified
and remediated.
Lesson 4.2: Consolidating
Products
Scenario 1: Large Organization - Many Departments
Software Consolidation:
1.Unified Vulnerability Management Platform: Implement a centralized tool that integrates scanning, reporting,
and remediation across all departments. This helps standardize processes and reduces redundancy.
2.Standardized Software Stack: Encourage departments to adopt a common set of software tools (e.g., ticketing
systems, endpoint protection) to streamline vulnerability management and reduce the attack surface.
3.Centralized Training: Provide organization-wide training on vulnerability management tools and best practices
Hardware Consolidation:
5.Standardized Hardware: Standardize on specific hardware models to facilitate easier updates and patch
6.Centralized Monitoring: Implement a unified monitoring system that provides visibility into the hardware state
-Risk identification is the first step in the risk assessment process and involves recognizing
- Determining your risk profile means assessing the specific threats, vulnerabilities, and
potential impacts to your organization, which informs strategic decision-making and helps
• Implementing automated tools for vulnerability scanning can streamline the process
of identifying weaknesses in systems. These tools can regularly scan the network,
and respond to potential threats in real-time, improving overall security posture and
security landscape, reducing the number of tools that need to be managed, and minimizing
integration issues. This streamlining allows for better visibility and control over
vulnerabilities, enhances data sharing between tools, and improves incident response times.
• Prioritizing vulnerability remediation involves assessing the risk level of each vulnerability
based on factors like potential impact, exploitability, and asset criticality, allowing teams to
complexity, minimizing integration challenges, and providing a unified view of the security