Pentesting and Vulnerability Management: Session Three – Mastering Threat Monitoring
Ongoing proactive management of your environment – how to use and sell vulnerability management So, you've done your pen test(s) and started the fixes, how do you monitor new threats and track your progress against the pen test recommendations.