3rd Party Risk Management , Events , Governance & Risk Management

Tackling Vulnerabilities Qualitatively, Not Quantitatively

Vulcan Cyber’s Yaniv Bar-Dayan on Increase in Attacks Affecting IT Management Tools
Yaniv Bar-Dayan, co-founder and CEO, Vulcan Cyber

Organizations need to change their approach to managing risk and vulnerabilities, monitor data to one place and identify the true risks - vulnerable devices and systems that matter most to the business, said Yaniv Bar-Dayan, co-founder and CEO of Vulcan Cyber. It’s time to move from quantitative to qualitative analysis, he said.

See Also: Solving the Fractured Data Problem in Exposure Management

Bar-Dayan said organizations need to eliminate data silos and fix what matters to make sure the stakeholders across the enterprise can work without delays or disruptions.

In this video interview with Information Security Media Group at Infosecurity Europe 2023, Bar-Dayan discussed:

  • How to collect data from multiple tools and run the processes automatically;
  • Why 70% of attacks are based on known, published vulnerabilities;
  • Why some "celebrity" vulnerabilities are worth prioritizing.

Bar-Dayan is a veteran of an elite Israeli military intelligence unit and has led numerous high-value cybersecurity projects throughout his career. He has spent more than a decade improving cybersecurity and reducing cyber risk for some of the largest companies in the world. In February 2018, together with friends Roy Horev and Tal Morgenstern, he launched SaaS provider Vulcan Cyber.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.