Vulnerability Management: Getting down to brass tacks

The webinar has ended

When it comes to data vulnerability management, there can be a lot of confusion. Get the "Who, What, When, How, and Why" of data security testing fundamentals.

When it comes to vulnerability management, there can be a lot of confusion within the security and compliance world— particularly around two of the most popular network security options available to test your defenses: penetration testing and vulnerability assessments.

As an IT Professional, you might have questions such as:
  • What is the difference between penetration testing, vulnerability scanning, and assessments?
  • What are the different testing and scanning options available and the purpose of each?
  • How often should these tests be performed?
  • What should each report contain, and what are the next steps for remediation?
  • How to know which service is right for your organization?

Join the Defendify team as we discuss the “Who, What, When, How, and Why” of these security testing fundamentals. You’ll leave with a breakdown of the differences between external, internal, web application, network segmentation, wireless, black, white, gray, authenticated, unauthenticated, and more! We’ll answer the myths and questions frequently asked about vulnerability management that our team hears from the wide range of business leaders we’ve worked with over the years.

Expert Presenters
Glen Capen
Glen Capen

Success Manager

Shanna Utgard

Former Sr. Cybersecurity Advocate, Defendify

Free resources

Free Compromised Password Scan

Automate scanning of the dark web for stolen passwords so you can protect email accounts and credentials found from malicious activity.

Defendify Essentials Package

See where you stand and get in-the-know with multiple layers of security in a single solution. Nothing to install. Nothing to pay for.

Protect and defend with multiple layers of cybersecurity

Defend your business with All-In-One Cybersecurity®.

Explore layered
security

Learn more about Defendify’s three key layers and All-In-One Cybersecurity®.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.