Vulnerability Assessment are more than simply clicking print on your scanner of choice. Moving beyond a stagnant checklist-limited approach and modeling assessments after the attacker's perspective is a crucial component of any transformational vulnerability management program. Together, let's explore the world of vulnerability dominance.
In this talk, we take a guided tour in the life of a vulnerability and explore an assessment that cuts it short. Using a seven-step vulnerability assessment model to guide our keystrokes, we can ensure repeatable value while delivering elite engagements each time. Then we take action on an enterprise scale by leveraging force multiplying tools and techniques like PowerShell.