Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business ResilienceSecurity Education & Training

Vulnerability management simplified: The core essentials

By Mike Monday
Building blocks

Esther Jiao via Unsplash

January 30, 2025

In light of today’s evolving threat landscape and high-profile cybersecurity breaches, organizations are facing growing pressure to strengthen their security foundations. These incidents highlight the urgent need for proactive strategies to address vulnerabilities in applications, infrastructure and data. CISOs and security teams can take action now to prepare for potential threats, focusing on a few essential priorities. 

Strengthening foundational security measures to reduce exposure and improve resilience

It all starts with assets. What are you protecting? Asset management is one of the most fundamental and critical enterprise requirements of a strong vulnerability management program. How can you protect what you don’t know about? Most organizations I have worked with over my career struggle to define or understand their asset inventory with any level of confidence. As a result, this leads to unknown or end of life applications and infrastructure on the network exposing vulnerabilities leaving the virtual doors and windows to your organization open for a potential malicious insider or adversary to take advantage of.

While I’m not suggesting the security team should own and maintain the enterprise asset management program, they certainly are a key stakeholder and should be consulted to provide key requirements. For example, a strong asset management program should at a minimum, include key attributes such as location, internal/external facing, versions, owner, and associated risk level which feeds into assigning criticality of that asset. These key asset attributes along with a criticality label allow the organization to not only prioritize and appropriately define controls but also help save remediation time and money in those critical moments during a breach or critical vulnerability event. Know your assets!

Preparing for inevitable breaches with strong recovery plans and scenario planning

In the digital world we now live in, it is not a matter of if, but rather when an organization will have to respond to a breach. The more you are prepared and demonstrate your ability to quickly respond and recover, it will go a long way with maintaining the trust of your customer base as well as external regulatory bodies. Organizations should look no further than our military institutions for guidance and model behavior of how to be prepared for any event. Rest assured, they are not sitting around waiting for an attack and figuring it out on the fly. Just as they understand their adversaries and how they behave, they regularly run through exercises to practice responding to every potential scenario.

At a minimum, organizations should be regularly conducting table top exercises based on relevant and timely threats and events. As an example, given the very rampant and routine occurrences of ransomware attacks, organizations should routinely be walking through their incident response playbooks of how to respond. Do we pay or not pay threat actors? Do we have reliable recovery plans and data backup? How quickly can we recover? These are just a few of the questions that you should be looking to have answers to prior to a real-world incident. It is critical to adhere to the playbook and procedures as they are written throughout the tabletop exercise to ensure they are accurate and effective. As a result of the exercise, any noted deficiencies during the exercise should be addressed and the playbooks and procedures need to be updated. As the organization incident response capabilities mature, the scenarios and exercises should increase in size and complexity. You will only get out what you put into these. Exercise. Exercise. Exercise.

Clarifying roles and responsibilities during incidents to ensure seamless coordination

The dreaded incident call comes in on a Friday evening at 6 p.m. the night before a holiday weekend. For those who have worked in the incident response space, this is the way it always happens. It’s now time to put all that time and effort that have gone into developing playbooks and running through exercises into real world action. Just as important as the technical procedures to contain and eradicate the situation, are the clearly defined roles and responsibilities to ensure seamless coordination. Make no mistake, there will always be some level of chaos no matter how prepared you are. However, strong coordination and communication during an incident will keep the chaos to a minimum and allow the team to stay focused on controlling and eradicating the incident.  

It is noteworthy that strong incident response plans define roles and responsibilities well outside of the technology areas. For example, internal and external legal counsel, public relations and local, state and federal law enforcement and possibly your regulators. In an ideal situation, standing up the incident command center and executing the communication plan should be second nature and go a long way to managing the chaos and avoid creating incidents within the incident. Know your role!

Aligning risk tolerance across the organization to enable faster, more effective responses

We now know our assets. We have well written incident response plans that include clearly defined roles and responsibilities. How do we now prioritize our response and recovery activities in the heat of the moment? This is where an organization’s defined risk tolerance combined with well documented asset management including criticality ratings pays off. Not all assets are created equal. The systems used to publish and display the menu of the day in the cafeteria is obviously not as critical as the systems and infrastructure that run our core customer facing portal and applications. Sound risk management and asset management practices are also pivotal to an effective vulnerability management program. It allows the vulnerability management teams to monitor, report and prioritize remediation activities using a risk-based lens.  

While important to focus on maintaining our critical assets, in the mindset of a threat actor, a vulnerability is a vulnerability. The low hanging fruit for an adversary are those end-of-life applications and devices that cannot be patched and remain connected to our network. These applications and devices expose critical vulnerabilities allowing easy access to an adversary to exploit and move laterally across our networks and applications. This is a reminder that we can focus on our most critical assets, but bad asset and vulnerability management hygiene can undermine the best laid plans and programs. Going back to managing the chaos during an incident, knowing our critical assets and infrastructure will also allow the incident response teams to prioritize and focus on critical systems first. This can potentially be a life saver and minimize critical data loss and customer impact. Risk management can be complicated. However, complexity kills. Do your best to keep it simple!

KEYWORDS: vulnerability vulnerability assessment vulnerability management

Share This Story

Mike monday headshot

Mike Monday is Managing Director of Protiviti’s Security & Privacy Practice. Image courtesy of Monday

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing