Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Embrace a holistic approach to vulnerability management

By Joe Schorr
risk-management-assessment-freepik7834.jpg
September 20, 2021

Cybercriminals aren’t slowing down, hacking 30,000 sites a day, according to Web Arx Security. In fact, a University of Maryland study clocked a new attack somewhere on the web every 39 seconds — that’s 2,244 daily cyberattacks. “The Hidden Costs of Cybercrime,” a joint report from the Center for Strategic and International Studies and McAfee, estimated monetary losses from cybercrime at $945 billion. 


These and other rising security threats mean stop-gap measures or past practices — like quarterly or biannual vulnerability scans — don’t provide the necessary level of defense. While most organizations perform some type of vulnerability scan, the sheer number of potential threats those scans reveal can leave organizations feeling overwhelmed and unclear about how to proceed.


Identifying and scanning is an important aspect of vulnerability management, but it’s just one piece of the puzzle. Organizations failing to see the full vulnerability picture tend to struggle unless they embrace a holistic approach with their vulnerability management program (VMP). 


Vulnerability management solutions enable organizations to make strategic security decisions by providing a comprehensive view of all technology vulnerabilities across modern attack surfaces, including active directory, operational technology and the cloud. 


The process involves identifying, assessing, managing, and reporting on a wide range of potential threats and vulnerabilities. Companies can use custom or pre-built reports to evaluate and prioritize which vulnerabilities to address first. Vulnerability data collected includes:

●     Background information

●     Scoring

●     Impacted assets

●     Exploitability details


A holistic approach offers a much broader spectrum of protection against possible attacks, threats and asset vulnerabilities by eliminating gaps and overlaps. It can seek out hidden vulnerabilities that are difficult to find even as threats become increasingly sophisticated and exploitative.


Critical components for holistic VMPs

To implement a holistic VMP — and create a barrier against threat actors finding and attacking vulnerabilities — first requires that we identify the elements comprising it. 


Asset Awareness

Critical to a VMP’s success, understanding and knowing network architecture is a key component for performing vulnerability scanning. By increasing their scope of asset inventories and classifications, companies can fine-tune the type and frequency of their scans and create protocols for mitigating any vulnerabilities they discover.


Growing asset awareness over time also increases organizations’ abilities to more efficiently and effectively conduct other functions, including compliance and risk management. In time, increased asset awareness also helps determine how best to leverage a program’s threat intelligence to implement more targeted, agile testing/assessments. 


Vulnerability Governance

This governance helps organizations understand issues blocking greater efficiency or effectiveness in vulnerability management. It’s used to establish, provide higher-level visibility, facilitate alignment with a company’s mission and priorities, and communicate key performance indicators (KPI), service level agreements (SLA) and key risk indicators (KRI) to key decision-makers, including executive leadership. With this governance framework, organizations can identify which assessment, testing or risk management process/techniques might need modification to increase their effectiveness.


Testing/Assessments

Most organizations already use testing and assessments. But some don’t take them far enough. Risk management professionals (or whoever’s in charge of risk management) should link different testing forms to both the risk management functions and the vulnerability governance. The tests should include defined criteria to achieve SLAs, and their effectiveness be measured by specific vulnerability management metrics.


Risk Management

Risk management is a broad umbrella that encompasses threat management/intelligence and incident management. Leveraging results from testing and assessments plus holistic risk management generates a robust risk profile detailing all potential threat exposure and cyberattacks. 


Change Management

The final, integral piece of a VMP, change management, helps GRC professionals manage patches and inform and guide configuration management. This functional area enables organizations to establish communication across individual silos and ensure all stakeholders receive updates and possible impacts of changes.


Best practices for implementing a holistic VMP

Any asset connected to a company’s overall business continuity, architecture or nearly anything with an IP address is fair game for attack. And vulnerability management isn’t just important from a risk management perspective. Many cybersecurity frameworks — HIPAA, NIST and PCI DSS, for example — require it as part of their compliance alignment.


For the best approach to implementing an effective, holistic VMP, companies should:

●     Establish a program with buy-in from the executive leadership and clearly defined goals, objectives and scope.

●     Identify assets, including customer support, accounting/billing, customer data, proprietary information databanks and other mission-critical systems, plus compliance requirements.

●     Choose the right, scalable technology to support and grow as the organization’s needs evolve.

●     Identify the business and technical owners and create a consistent, clear communication channel to discuss assets and provide updates/recommendations about associated risks.

●     Train employees on the VMP and opt for a democratized, rather than siloed, approach that empowers more employees to buy into, understand and use the program.

●     Define scanning frequencies and create SOP to generate and distribute reports to the correct people in a reasonable amount of time.

●     Develop remediation processes and activities beyond applying patches — whether it’s hardening default configurations, restricting privileged access or network re-architecting.

●     Create sustainable, repeatable processes that maintain the VMP’s effectiveness.


Ultimately, the failure to implement a holistic vulnerability management program leaves businesses open to evolving cybersecurity threats. The right vulnerability management application provides companies with a comprehensive perspective of the organization’s entire attack surfaces. By transforming data into meaningful insights to develop security strategies, companies — and their stakeholders — gain a strong defense against the cyberattack landscape and peace of mind.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joe Schorr is VP of Strategic Alliances at LogicGate.

 


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Five hands circled together

    The new normal: How to embrace a cultural approach to zero trust

    See More
  • dell technologies

    Dell Technologies takes a holistic, risk-based approach to build resilience

    See More
  • Warning cyberattack

    Organizations need a strategic approach to attack surface management

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!