2023 Cyber Security Strategy
Vulnerability Management & Beyond
• Implement automated vulnerability scanning of systems and applications • Real-time endpoint scanning for vulnerabilities Identify and immediately mitigate exploitable vulnerabilities • Exploit code is available in the wild •
Scan IoT devices •
•
Develop secure configuration standards based on device type and identified issues
7
Made with FlippingBook - Online catalogs