Wednesday, May 29, 2024

HomeCyberSecuritySolving the Fractured Data Problem in Exposure Management

Solving the Fractured Data Problem in Exposure Management

Events
,
Governance & Risk Management
,
RSA Conference

Sevco Security’s J.J. Guy on Aggregating and Prioritizing Vulnerabilities


J.J. Guy, CEO, Sevco Security


Security teams continue to grapple with maintaining a comprehensive and accurate inventory of their digital assets, vulnerabilities and exposures.

By aggregating device inventories, user accounts, software installations, and vulnerabilities from multiple sources, organizations can produce a unified and de-duplicated view, facilitating effective exposure management and prioritization of vulnerabilities like CVEs and missing controls based on technical severity and business context, said J.J. Guy, CEO, Sevco Security.

“The core problem is not that no one has a device inventory. It’s that they have got a dozen. They all use a different technology to measure inventory. It’s not that they are wrong per se, but they measure a different subset of the whole,” Guy said. “Only by aggregating all those together and going through the complex data processing and the after-aggregation to accurately de-duplicate the results, you start to understand what the true picture looks like.”

In this video interview with Information Security Media Group at RSA Conference 2024, Guy also discussed:

  • The importance of fostering collaboration between security and IT teams to manage exposures and remediate issues;
  • How Sevco’s solution incorporates automated remediation workflows, integrating with IT service management systems and ticketing tools;
  • Applying business context for prioritizing remediation efforts across all classes of vulnerabilities beyond just technical severity.

Guy served as an intelligence officer in the U.S. Air Force and the U.S. federal government for more than a decade. He has nearly 25 years of leadership experience and has been involved in founding several startups, including Carbon Black, JASK and NetRise.




Source link

Bookmark (0)
ClosePlease login
RELATED ARTICLES
- Advertisment -spot_img

Most Popular

Sponsored Business

- Advertisment -spot_img