Case Study
Risk based Vulnerability Management Maturity in India
!"#$%&'#()*+,-.(!'&"-"/0 1'.'2(1(./*1'/,!"/0*".*".)"' !"#$%&'()'*)+,-)'.(/0-),%12'.&3%#1%."#,4&'5%14'6#-.4,.%1CONTENTS 1. Executive Summary 3 2. Introduction 4 3. Understanding risk-based vulnerability management 5 4. Defining a good risk-based vulnerability management solution 8 5. Current State Analysis 10 6. Considerations while selecting a RBVM vendor 11 7. Four Best practices for an effective RBVM program 12 8. Survey Design and Implementation 14 !"#$%&'#()*+,-.(!'&"-"/0*1'.'2(1(./*1'/,!"/0*".*".)"' 31. EXECUTIVE SUMMARY !"#$%&'#()*+,-.(!'&"-"/0*1'.'2(1(./*1'/,!"/0*".*".)"' 4 Cybersecurity is an ever evolving field. While enterprise investments in information security in India are increasing, the number of security breaches and threats is growing as well. Why
