2023 Cyber Security Strategy

Vulnerability Management & Beyond

• Implement automated vulnerability scanning of systems and applications • Real-time endpoint scanning for vulnerabilities Identify and immediately mitigate exploitable vulnerabilities • Exploit code is available in the wild •

Scan IoT devices •

Develop secure configuration standards based on device type and identified issues

7

Made with FlippingBook - Online catalogs