Threat and Vulnerability Management
Closing the circle
This stream is designed to allow members to understand the full data and threat lifecycle, how to manage them and communicate them to all levels, from Board members to Developers.
Systems, processes, ideas and tips to push this through your company.
Security Architects, CISO and people who are looking at the bigger picture.
Back to list of all Working Sessions and Tracks
Edit this page here