Note: This webcast is free of charge however a SANS portal account is required (see webcast link for details)
One of the keys to a proper vulnerability management program is an accurate and complete inventory of the hardware and software using in the environment. Those two items are #1 and #2 in the CIS 20 Critical Controls. In this webinar well discuss ways you can find the hardware you may have forgotten was there, was never taken offline, or was added with permission, or was setup temporarily.
Tim Medin is the co-author of our brand-new SANS SEC460: Enterprise Threat and Vulnerability Assessment training course. This course is being taught in Sydney, Australia on August 20th - 25th and in Singapore on October 15th - 20th.
Sydney: https://www.sans.org/event/august-sydney-2018/course/enterprise-threat-vulnerability-assessment
Singapore: https://www.sans.org/event/october-singapore-2018/course/enterprise-threat-vulnerability-assessment