Discussion Topics
Security professionals responding to a CRA Business Intelligence survey have encountered multiple challenges in their quest to achieve solid vulnerability management. Some struggle to get adequate executive buy-in and funding, while others find their efforts complicated by a glut of legacy technology accumulated during mergers. Those doing the best at VM say business planning and policymaking are key to success. This report takes the challenges identified and offers guidance for the path forward.