Skip navigation
Effective Vulnerability Management
Book

Effective Vulnerability Management

Managing Risk in the Vulnerable Digital Ecosystem

Wiley, 2024
First Edition: 2024 more...

Buy book or audiobook

Read offline

Editorial Rating

9

Qualities

  • Applicable
  • Eye Opening
  • Concrete Examples

Recommendation

As of 2022, 60% of the world’s gross domestic product depended on digital technologies. Hence, many leaders worry about the possible impact of a “catastrophic cyber incident.” The crucial issue, cyber experts Chris Hughes and Nikki Robinson say, is managing your digital systems’ vulnerability to attack. Digital vulnerability emerged as a concern in US Department of Defense studies in the 1970s and is a daily issue now. In today’s internet saturated business environment, people and organizations need to manage their digital vulnerability in advance of any problem or attack – just ask the US car dealerships who struggled through a calamitous, summer 2024 ransomware attack.

Summary

Asset management is crucial in protecting against digital vulnerability.

Digital environments all differ, but any “vulnerability management program” (VMP) must include digital asset management tailored to fit an organization’s needs. Each company’s supply of digital assets varies. For instance, it could include smartphones and laptops, a selection of applications, and software as a service (SaaS). In the past, an IT manager could handle digital asset management with a spreadsheet. However, standard asset management approaches can’t contend with today’s dynamic digital environment, which includes the use of cloud infrastructure and open-source applications and which faces serious threats, such as ransomware attacks and cybertheft.​​​​

Companies can use a variety of tools to manage their digital assets, potentially including inventories on the cloud, software that detects vulnerabilities, and configuration management software. Smaller firms might manage their assets manually – particularly their physical assets, such as servers and networking devices. But today’s digital workforce relies on multiple devices, which...

About the Authors

Chris Hughes, MBA, is an adjunct professor for MS Cybersecurity programs and a co-founder and President at Aquia. Nikki Robinson, MS, DSc, teaches graduate courses at Capitol Technology University and Touro College.


Comment on this summary