Cyber IT Supervisory Forum eBook

Takeaways

1. Ensure vulnerability management process addresses entire environment

2. Outsource tasks – not responsibilities

3. Identify goals and then build metrics to support

4. Build reporting to match audience – and support decisions

35

Made with FlippingBook Digital Publishing Software