From the course: Implementing a Vulnerability Management Lifecycle

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Assign qualified people

Assign qualified people

From the course: Implementing a Vulnerability Management Lifecycle

Start my 1-month free trial

Assign qualified people

- [Instructor] Let's take a closer look at who you should assign to your vulnerability management program team and what they'll do. As I mentioned in the last video, you'll need qualified people to operate the program. Now, let's review a sample staffing model designed for a small to mid-sized organization. As you can see, there's a lot of variability in the skills required as well as the number of hours per week that you can expect to spend finding and managing vulnerabilities. While it's possible you might find one person to do every task listed, it's more likely that you'll need a team. For example, an information security analyst will monitor the vulnerability data feeds, review the scanning reports, and design mitigations. You'll also need someone to create and assign support tickets for each mitigation. And you'll need people to actually deploy the mitigations. They will typically be the people who administer the…

Contents