Rolling Out a Successful VM Program

Ed Pagett, Chief Information Security Officer, Lender Processing Services

  • Introduction (00:00:00)
  • Cultural Alignment (00:00:39)
  • Overcoming Inertia (00:02:28)
  • Scanning Prioritization (00:06:58)
  • Practical & Tactical Scanning (00:10:00)
  • Remediation Strategy (00:11:40)
  • Analysis & Intelligence (00:13:49)
  • Remediation Strategies (00:17:54)
  • Reporting Strategies (00:20:14)
  • Maturing the Program (00:21:03)
  • Chapter Title (00:22:42)
Introduction