Why Vulnerability Management Is Important

Introduction

Year after year, cybercriminals take advantage of more opportunities to infiltrate a system’s vulnerabilities. These attackers feast on the systems that show no real signs of cyclical security maintenance and prevention techniques. While vulnerability management is not a sure fire way of fighting off these attackers, it is without a doubt one of the best preventative measures one can take to protect their network from the malpractices of cyber thieves around the world. However, before we can understand why vulnerability management is important, we must know what it is. 

Vulnerability Management is the identification, classification, prioritization, and treatment of software vulnerabilities. The combination of these recurring information security processes alongside other security tactics is a major key behind the success of many information security programs. Security vulnerabilities themselves are weaknesses caused by normal software development practices.

Even the most mature software development procedures with well-defined security practices can and regularly do leave us with software vulnerabilities. Software that is routinely exploited by attackers to breach many of the organizations we continue to see in the daily news. Bad threat actors don’t need weeks and months to scan the entire Internet looking for vulnerable systems. Today’s tools, like Zmap, for instance, allows this to happen daily. As you are probably already putting together, vulnerability management is the process of finding these weaknesses and treating them before attackers can take advantage of these threats.

It is important that the resolution of these threats is specific to the root cause. Patching, disabling unnecessary services, and managing configurations in such a way to not allow a misconfiguration to cause a security vulnerability are all possible treatments for potential security threats. So, what can these attackers do if they were to exploit these holes in your system before they are patched?

The Unfortunate Impacts of Breaches

Unfortunately, it would be easier to answer this question if it were “what CAN’T these attackers do if they were to exploit these holes in your system before they are patched”. The list can go on and on but to shorten the list, attackers exploit these vulnerabilities to damage network assets, cause a denial of service, or most commonly, steal potentially sensitive and private information.

Private information such as credit card details, social security numbers, email addresses, and passwords are all stolen by attackers and sold on the dark web on a regular basis. Any of these outcomes can be detrimental to an organization’s daily operations or business. Along with the long-term pain that comes with getting information back or sometimes even starting over from scratch, the monetary loss is what really takes a toll on a company that experienced a breach.

This can be seen in recent years when one of the largest data breaches in history took place. In 2017, Equifax suffered a breach which led to over 147 million people’s personal information being stolen and in possession of the wrong hands. This monumental breach could have been avoided if their security team had proactively patched a well-known vulnerability in their consumer complaint web portal. However, deficiencies in their vulnerability management program are why this breach has cost Equifax close to $1.4 billion in fines and lost business. To even a company as large as Equifax, $1.4 billion is a large chunk of change. Considering that Equifax is a publicly-traded company, the impact on shareholders was immense! In fact, the company’s CEO, CIO, and Chief Security Officer all stepped down after the breach was publicly announced.

But you might be thinking, “there’s no way that most organizations leave well-known vulnerabilities open long enough for attackers to exploit, right?” You may want to think again. 

Why Vulnerability Management is Important

According to recent studies, 60% of all breaches involved vulnerabilities where a patch was available, but it had not yet been applied. That is insane!

Imagine you are sitting in a busy coffee shop with important personal information pulled up on your laptop. Then, you need to go to the restroom, so what do you do? More than likely you either change screens, close your laptop, or even bring your laptop to the restroom with you. You do this because you don’t want other people seeing the personal content on your screen that you were viewing just seconds before. It’s just common sense!

However, this is the same scenario but in terms of network security and vulnerability management. Some organizations store tons of data and personal information within their network, but for some reason leave it open and unsecured for any wandering eyes to see. Although, just because you have a proper program in place does not guarantee that your systems are completely safe.

Well known companies such as Home Depot and Target have experienced breaches in the past. Even though they are both large organizations with well-funded cyber-security efforts, attackers were still able to find a way into their respected systems and unleash their malicious tactics. Just because these companies did experience breaches even while taking great precautions should not undermine the value of a great vulnerability management program.

A system with a great program is certainly more secure than the same system without. Vulnerability management is integral to not only identifying unsecured access points, but also mitigating the level of risk that comes with these holes in the system. How does a vulnerability management program go about solving these issues, though?

Threat & Vulnerability Management Programs

The first step in an effective vulnerability management program is to identify all of your IT assets and determine where the risks live. However, keep in mind that not all organizations are the same and the nature of the business can help you where the risk could be.

For retail companies, it’s their Point of Sale systems (and all systems that support them). For online retailers such as Amazon, the threat is more likely to exist in web applications, inventory systems, partner payment systems, etc. These points are not to take away from the importance of other systems.

Hackers do often compromise secondary systems first before working their way over to the system they actually intend to attack. A good program will scan all systems in a network looking for open ports and running services that can be correlated back to known vulnerabilities. This is just the first step in the process. The second step in an effective vulnerability management program is identifying the vulnerabilities that may exist within your network. After all, you can’t fix what you don’t know is broken.

Next, a good vulnerability management program will prioritize the vulnerabilities it finds in the order of greatest risk to lowest. Obviously, the vulnerability with the highest risk factor should be dealt with first and as quickly as possible. Next comes the step where many organizations fail to take the appropriate approach and like Equifax, this can turn into a costly mistake if not done correctly. Once the vulnerabilities are prioritized in order of importance, it is crucial to determine if they should be fully patched to avoid exploitation, mitigated to decrease the risk of exploitation until a better fix is possible, or simply brushed to the side and make the decision that no action will be taken.

The last option is generally only taken when it will cost more to patch the vulnerability than it would for it to be exploited. One other reason a business would take this route is if they can’t afford to take a production system out of service to apply any necessary changes. The time spent fixing the system may result in a loss of revenue greater than what would be caused by the vulnerability being exploited by an attacker.

Finally, a good vulnerability management program will report on its findings so that for future cases, the process can be sharpened and take less time as well as possibly even less money to fix problems. Good programs also include multiple stakeholders and technical owners. Oftentimes vulnerability management programs fail when there is only one person doing the work. Having a combination of all relevant business owners, security owners, and technical owners is a great way to strengthen your system as a whole. 

Conclusion

There is no guaranteed way to prevent hackers from making their way into your network. However, there are ways that organizations can slow them down and implementing a great vulnerability management program is undoubtedly one of the best investments a company can make. The risks that come with a breach in a network’s system can have a far greater financial impact than the small cost that comes with a top-tier vulnerability management program. Rather than assume a breach will never happen to you and your organization, now is the time to be proactive and implement the appropriate preventative measures to further secure your information, your organization’s information, and your customer’s information. 

About Secutor

Secutor Cybersecurity is a trusted partner comprised of industry leading experts in the fields of Cybersecurity and Governance, Risk and Compliance. We partner with our clients to deliver on-demand solutions tailored to expertly navigate the regulatory demands of their specific industries.

Our proven track record of successfully exceeding client expectations is achieved through the combination of our methodical approach, advanced technologies, subject matter experts, and synergy with client team members.

Secutor is your team of world-class problem solvers with vast expertise and experience delivering complete solutions keeping your organization protected, audit-ready, and running smoothly.

Scroll to Top

Jason Fruge

Consulting Chief Information Security Officer (CISO)

Jason Fruge is an accomplished Consulting Chief Information Security Officer at Secutor Cybersecurity, bringing over 25 years of deep expertise in information security. His storied career includes leading and managing robust security programs for Fortune 500 companies across retail, banking, and fintech sectors. His current role involves providing strategic guidance and advisory services to clients, focusing on security governance, risk management, and compliance.

Apart from his consulting responsibilities, Jason is an active member of the global cybersecurity community. He is a Villager at Team8, a prestigious collective of senior cybersecurity executives and thought leaders. Additionally, he serves as an Advisor at NightDragon, an innovative growth and venture capital firm specializing in cybersecurity and enterprise technologies.

Jason’s tenure as a CISO is marked by a proven track record in developing and implementing comprehensive security policies and procedures. He adeptly leverages security frameworks and industry best practices to mitigate risks, safeguarding sensitive data and assets. His expertise encompasses incident response and root cause analysis, where he has notably managed cyber incidents to prevent breaches and minimize business disruption and customer impact.

A key aspect of Jason’s role has been the creation and facilitation of executive and board-level cyber risk committees, ensuring organizational alignment and awareness. His responsibilities have extended to maintaining compliance programs for standards such as PCI and SOX, as well as leading privacy and business continuity programs. Holding prestigious certifications like CISSP, QSA, and QTE, Jason is also a recognized thought leader, contributing articles on cybersecurity to InformationWeek.

Jason’s passion lies in driving innovation and fostering collaboration in the cybersecurity field. He is currently seeking an executive CISO role in a leading retail, finance, or fintech organization, where he can continue to make significant contributions to the cybersecurity landscape.

Jennifer Bayuk

Cybersecurity Risk Management Expert

Jennifer Bayuk is a highly esteemed cybersecurity risk management thought leader and subject matter expert at Secutor Cybersecurity. Her extensive experience encompasses managing and measuring large-scale cybersecurity programs, system security architecture, and a wide array of cybersecurity tools and techniques. Jennifer’s expertise is further deepened with her proficiency in cybersecurity forensics, the audit of information systems and networks, and technology control processes.

Jennifer’s skill set is comprehensive, including specialization in cybersecurity risk and performance indicators, technology risk awareness education, risk management training curriculum, and system security research. Her academic achievements are noteworthy, holding Masters degrees in Philosophy and Computer Science, and a Ph.D. in Systems Engineering. This strong academic background provides a solid foundation for her practical and strategic approach to cybersecurity challenges.

Certified in Information Systems Audit, Information Systems Security, Information Security Management, and IT Governance, Jennifer is a well-rounded professional in the field. Her credentials are further enhanced by her license as a New Jersey Private Investigator, adding a unique dimension to her cybersecurity expertise.

At Secutor, Jennifer plays a pivotal role in steering cybersecurity initiatives, aligning them with organizational risk appetites and strategic objectives. Her ability to educate and train in the realm of technology risk has been instrumental in raising awareness and enhancing the cybersecurity posture of our clients. Her dedication to research and continual learning makes her an invaluable resource in navigating the ever-evolving cybersecurity landscape.

Jennifer Bayuk’s blend of academic prowess, practical experience, and certifications make her an indispensable part of our team, as she continues to drive forward-thinking cybersecurity solutions and risk management strategies.

Steve Blanding

CISO Consultant

CISSP, CISA, CGEIT, CRISC

Steve is an IT management consultant living in Dallas, TX. Steve has over 35 years of experience in executive IT leadership, IT governance, risk and compliance (GRC), systems auditing, quality assurance, information security, and business resumption planning for large corporations in the Big-4 professional services, financial services, manufacturing, retail electronics, and defense contract industries. He has extensive experience with industry best practices for adopting and implementing new technologies, IT service management frameworks, and GRC solutions that have dramatically improved customer satisfaction while reducing cost.

Industry Experience

  • State Government: 5 years
  • Retail: 5 years
  • Defense Contract: 5 years
  • Manufacturing: 2 years
  • Health Care: 2 years
  • Local Government: 2 years
  • Public Accounting (Big 4): 7 years
  • Insurance: 3 years
  • Financial Services: 5 years

Key Career Accomplishments

  • Conducted a full-scale ISO27000 audit 4 times over the past 6 years.  Also, conducted a “light” ISO27000 review of a small Dallas-based company in 2007.
  • Developed and authored a comprehensive IT security policy manual, incident response plans, training programs, security contingency plans and configuration management plans for FedRAMP regulatory compliance.
  • Conducted multiple DR and operational backup and recovery IT risk assessments of critical business systems on mainframe, LAN, and distributed system networks located across North America.
  • Conducted data centers audits for Tyco Corporation (Brussels, 2005 and Denver, 2006), Farmers Insurance (Los Angeles, 2006), Zurich Financial Services (Chicago, Kansas City, and Grand Rapids, 2006), and Convergys Corporation (Dallas, 2010, 2011, and 2012).
  • Led a project to remediate segregation of duties and streamline user access system security and HIPAA compliance administration across 5 regions in North America, resulting in cost savings of $700,000 per year (Kaiser Permanente).
  • Implemented Sarbanes-Oxley Section 302 and 404 IT general and application controls, reducing security administration costs and improving operational performance by 50% or $500,000 annually (Tyco Corporation).
  • Led the global SAP business-IT alignment, process re-design implementation initiative for financial accounting, materials management, production planning, quality management, sales and distribution, warehouse management, and plant maintenance, which resulted in creating $2,000,000 in cost savings.
  • Engaged by Arthur Andersen in Houston to transform the local IT organization and then direct 3 organizational mergers/consolidations, which resulted in a 25% reduction in operating costs, or $3,250,000, while improving customer satisfaction by 30%, and improving employee morale, technology availability and the quality of IT infrastructure and service delivery.
  • Assigned by Arthur Andersen global leadership to lead global project teams responsible for data center and customer support call center consolidation, which resulted in annual operational cost savings of 45% or $4,000,000.
  • Implemented ITIL service management practices for problem management, incident management, help desk, project management, and operations management.
  • Conducted SOX 404 audits at Duke Energy (6 months), Red Hat (3 months), Tyco (9 months), Zeon Chemicals (4 months), and Convergys (2 months). Experience includes control design/documentation and effectiveness testing.

Publications:

Author, various articles in EDPACS and Auerbach’s IT Audit Portfolio Series, 1981 – 2001

Author, various articles in the Handbook of Information Security Management, 1993 – 1995

Editor, Auerbach’s Enterprise Operations Management, 2002

Editor, Auerbach’s IT Audit Portfolio Series, 2000 – 2002

Consulting Editor, Auerbach’s EOM Portfolio Series, 1998 -2001

Ready to Find Your Solution?

Reach out using the form below, and we’ll contact you as soon as possible to schedule your consultation.

Ready to Find Your Solution?

Use the form to schedule a consultation, and we’ll reach out within 48 hours to confirm the appointment.

Considering this delay, please only select meeting dates 48 hours or more in advance. Your information will only be used to facilitate a meeting.