Threat and Vulnerability Management


Closing the circle

Why

This stream is designed to allow members to understand the full data and threat lifecycle, how to manage them and communicate them to all levels, from Board members to Developers.

What

Systems, processes, ideas and tips to push this through your company.

Who

Security Architects, CISO and people who are looking at the bigger picture.



Back to list of all Working Sessions and Tracks

Edit this page here