Correlating Vulnerability Scans with Network Path Analysis to Find and Remediate the Biggest Risks to Your Network and Avoid Wasting Time on the Little Ones
Vulnerability scanning has its place but often produces a mountain of data with little guidance for prioritizing updates other than a relative high/medium/low risk rating of the exploit itself and of the device’s value.
Many of the vulnerabilities reported are mitigated by other compensating controls that the scanner is not aware of. The most frequent compensating control is network restrictions.
In this training, we will explore how to correlate vulnerability scans with network access path data to discover your biggest risks while helping de-prioritize those vulnerabilities that present the least risk when taking into account the current state of your routed network.