Governance & Risk Management , Next-Generation Technologies & Secure Development , Video

Putting Vulnerability Management in Context

Skybox Security's Kevin Flynn on Why Criticality is Not the Only Metric

When it comes to vulnerability management, many organizations opt to protect only their most critical security gaps - but, meanwhile, the criminals exploit the secondary vulnerabilities. Kevin Flynn of Skybox Security explains why context is everything in managing vulnerabilities.

See Also: Breaking Down Silos With a Holistic View of Security, Risk

In an interview conducted at ISMG's San Francisco Fraud and Breach Prevention Summit, Flynn discusses:

  • Where many enterprise go astray in vulnerability management;
  • The importance of context when assessing risks;
  • How Skybox Security helps customers get a better handle on myriad vulnerabilities.

Also, see Flynn present here on The Rise of Cybercrime as a Service: Which Threats Should We Address First?

Flynn is director of products at Skybox Security. Before joining Skybox in August 2016, Flynn was director of product marketing at Blue Coat Systems. With over 25 years of experience in high tech, he has been involved in cybersecurity technologies for over 15 of those years. His high tech experience started at Apple Computer where he was a product manager in Apple's Advanced Technology Group. Flynn then spent more than a dozen years at Cisco as a product manager and marketing manager in their security technology organization. After leaving Cisco, he moved over to Fortinet for three years before joining Blue Coat in 2013. Flynn is a frequent speaker on cybersecurity topics at conferences worldwide and has authored numerous articles on cybersecurity issues.


About the Author

Howard Anderson

Howard Anderson

Former News Editor, ISMG

Anderson was news editor of Information Security Media Group and founding editor of HealthcareInfoSecurity and DataBreachToday. He has more than 40 years of journalism experience, with a focus on healthcare information technology issues. Before launching HealthcareInfoSecurity, he served as founding editor of Health Data Management magazine, where he worked for 17 years, and he served in leadership roles at several other healthcare magazines and newspapers.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.