Heartbleed, Shellshock, FREAK, POODLE, VENOM – these are just some of the branded vulnerabilities that were disclosed in the past 18 months. With so many branded vulnerabilities coming out executives are paying more attention to application security. This is great, except that it also means CISOs and security professionals are under increased pressure to react to vulnerability disclosures, rather than create comprehensive, strategic plans around securing the applications that run their businesses. CISOs want their security programs to be more strategic in nature, yet they cannot ignore these potentially threatening vulnerabilities. They need a plan that can help them determine how urgent a vulnerability is, and how the team can respond.
This infographic outlines the five steps every vulnerability response plan should have.