Intelligent CIO Middle East Issue 25 | Page 16

LATEST INTELLIGENCE FIVE STEPS TO BUILDING A SUCCESSFUL VULNERABILITY MANAGEMENT PROGRAMME PRESENTED BY W hy is vulnerability management so difficult? Vulnerability management poses a unique challenge for businesses. Despite proven technology solutions and the best efforts of multiple IT teams, unresolved vulnerabilities consistently serve as a source of friction and frustration. Download whitepaper here Regardless of how many vulnerabilities are fixed, there are always those that can’t be easily remediated. Infighting between IT teams and business groups is common, each pointing fingers as to who is responsible for the potential risk these vulnerabilities pose to the environment. To deal with their frustration, companies often switch vulnerability management tools every few years, trying to use the latest technology to tighten control. While this may make sense if your security needs have 16 INTELLIGENTCIO changed, new tools won’t help if it is your processes that are broken. To build a successful vulnerability management programme, you need to determine what matters to your organisation, and then create a programme designed to best address those specific issues. That sounds simple, but it’s actually incredibly difficult. No two organisations are the same, so there is no standard playbook to follow that can tell you what to care about. Take the example of a European bank operating in the United States that fails several security audits because they did not patch operating system vulnerabilities. They could lose their ability to hold and handle currency in the U.S., costing them billions in revenue. To that bank, those vulnerabilities are mission critical. www.intelligentcio.com