Best Practices for Threat and Vulnerability Response

This course is designed to equip professionals with comprehensive strategies for identifying, prioritizing, and mitigating emerging cyber threats and vulnerabilities - especially within extended third party ecosystems. This course delves into techniques for achieving full visibility across vendor portfolios, integrating threat intelligence and vulnerability data from multiple sources, and employing automation and artificial intelligence to streamline risk assessments. Learners will explore how to develop rapid response plans, utilize inherent risk evaluations, and establish efficient reporting processes that bolster an organization’s security posture.

                          Course Companion

Participants who pass the exam will earn 1.5 CPE Credits from this program. 

Course Publication Date: March 7th, 2025
Course Review Date: March 7th, 2027


SHARE THIS ON:

Facilitated By:

Scott West

Scott West is the VP of Product Marketing at ProcessUnity. Before he joined the team, Scott's passion for bringing products to life saw him wearing many hats in Product Marketing, Senior Sales, and Executive roles at a bunch of tech and software startups. He's been around the block more times than he can count, helping to shape and launch countless products along the way.
NASBA Approved
ITCPEacademy.org from Executive IT Forums, Inc.(Sponsor Id#: 112059) is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org