Governance & Risk Management , IT Risk Management

Moving From Vulnerability Management to Vulnerability Response

Syra Arif of ServiceNow on Essential Steps
Syra Arif, senior advisory solutions architect, security & risk, ServiceNow

Shifting from vulnerability management to vulnerability response is becoming increasingly important, says Syra Arif of ServiceNow, who describes three essential steps.

See Also: The Top 5 Security Practices With the Best Outcomes

Those steps, she says, are: move to an automated strategy, focus on asset management as a core strategy and implement risk refactoring – “understand the business context of what’s happening in your organization so you can prioritize work."

In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Arif discusses:

  • The difference between vulnerability management and vulnerability response;
  • What healthcare organizations aren’t getting right today;
  • The role of artificial intelligence and machine learning in more effective and timely responses to vulnerability threats.

Arif is senior advisory solutions architect, security and risk, at ServiceNow. She has a diverse background including technical consulting, sales engineering and technical marketing in the areas of security operations, vulnerability management, threat intelligence, governance, risk and compliance, and identity and access management.


About the Author

Nick Holland

Nick Holland

Former Director, Banking and Payments

Holland focused on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.