Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilize to gain access to private systems and networks. In addition to their busy workload IT managers and administrators there is also a concern that a single critical vulnerability if overlooked ca be exploited later on and cause some serious issues. Vulnerability Management addresses this problem with a systematic approach to make this a reliable and reoccurring process. This module gives an overview of standards, details how to distribute security advisories among your constituency and how to plan an roll out patches in your organisation
The programmes includes a number of sessions - please note that there is one registration - once registered you are welcome to attend all or selected sessions.
Also please note that we shall send you a calendar invitation with the Zoom link closer to the date of the session.
If you have registered less than an hour before the start of a session please email email@example.com to let us know and we shall forward you joining instructions.
Please note that registration closes at 10 am CEST on 09 June 2021. If you wish to attend but no longer able to register please email firstname.lastname@example.org
Each session will be recorded; we shall notify all the participants how to access recorded sessions once recordings become available.
We look forward to seeing you (virtually) soon.