Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by KirkpatrickPrice. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by KirkpatrickPrice or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Vulnerability Management Episode

24:25
 
Share
 

Manage episode 492506720 series 3668135
Content provided by KirkpatrickPrice. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by KirkpatrickPrice or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

Jeff Pochily’s background

https://www.linkedin.com/in/jeffreypochily/

Vulnerability Databases

https://nvd.nist.gov

https://vuldb.com

https://www.cve.org

Open Bug Bounty Security Researchers

https://www.openbugbounty.org/researchers/top/

Recommended vulnerability management controls

  • Documented vulnerability management policies and procedures
  • Assignment of responsibility for vulnerability management to a qualified resource
  • Vulnerability assessment during development
  • Code reviews for secure coding compliance and software vulnerabilities
  • Ranking security vulnerabilities by impact
  • Documented asset inventory
  • Documented inventory of bespoke and custom software, and third-party software components
  • Consistent patch management process
  • Subscription to vulnerability notification services
  • Manual or automated application vulnerability assessment methods
  • Consistently update container deployment tools and images
  • Internal vulnerability scans
  • External vulnerability scans
  • Internal penetration testing
  • External penetration testing
  • Application penetration testing
  • Consistent remediation process for scan and pen test findings

KirkpatrickPrice scripts to check your systems

https://github.com/orgs/kirkpatrickprice/repositories

Cybersecurity & Infrastructure Security Agency

https://www.cisa.gov/topics/cyber-threats-and-advisories

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

  continue reading

5 episodes

Artwork
iconShare
 
Manage episode 492506720 series 3668135
Content provided by KirkpatrickPrice. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by KirkpatrickPrice or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

Jeff Pochily’s background

https://www.linkedin.com/in/jeffreypochily/

Vulnerability Databases

https://nvd.nist.gov

https://vuldb.com

https://www.cve.org

Open Bug Bounty Security Researchers

https://www.openbugbounty.org/researchers/top/

Recommended vulnerability management controls

  • Documented vulnerability management policies and procedures
  • Assignment of responsibility for vulnerability management to a qualified resource
  • Vulnerability assessment during development
  • Code reviews for secure coding compliance and software vulnerabilities
  • Ranking security vulnerabilities by impact
  • Documented asset inventory
  • Documented inventory of bespoke and custom software, and third-party software components
  • Consistent patch management process
  • Subscription to vulnerability notification services
  • Manual or automated application vulnerability assessment methods
  • Consistently update container deployment tools and images
  • Internal vulnerability scans
  • External vulnerability scans
  • Internal penetration testing
  • External penetration testing
  • Application penetration testing
  • Consistent remediation process for scan and pen test findings

KirkpatrickPrice scripts to check your systems

https://github.com/orgs/kirkpatrickprice/repositories

Cybersecurity & Infrastructure Security Agency

https://www.cisa.gov/topics/cyber-threats-and-advisories

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

  continue reading

5 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play