Star 0

Abstract

Vulnerabilities in applications typically have to be treated differently than those in networks and infrastructure. This discussion brings together application, network and infrastructure vulnerability managers to share best practices regarding metrics, tools and communication rhythms to help each group learn how to manage vulnerabilities more effectively in their respective areas.