Cyber IT Supervisory Forum eBook
Takeaways
1. Ensure vulnerability management process addresses entire environment
2. Outsource tasks – not responsibilities
3. Identify goals and then build metrics to support
4. Build reporting to match audience – and support decisions
35
Made with FlippingBook Digital Publishing Software