Where does vulnerability come into play with risk? Why should we focus on managing vulnerabilities in preference to the other components of risk? What is the best practices recommended procedure for vulnerability management? This webcast will present answers to these questions that plague todays risk and IT management teams. It will show the four major components of risk, their relationship to potential loss events, and explain why management should target the vulnerability component. The webcast will then work through the recommended process of addressing vulnerabilities with the goal of reducing your attack surface, and mitigating potential loss events.