BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250714T221955Z
UID:C48F8FEF-D031-456E-A113-B7855D66A63D
DTSTART;TZID=America/New_York:20250711T130000
DTEND;TZID=America/New_York:20250711T140000
DESCRIPTION:Abstract:\n\nAs cyber threats grow in complexity and frequency\
 , traditional vulnerability management strategies—centered around volume
  and severity scores—are no longer sufficient. Risk-Based Vulnerability 
 Management (RBVM) represents a shift from a reactive to a strategic\, inte
 lligence-driven approach that prioritizes vulnerabilities based on the act
 ual risk they pose to an organization’s assets and operations. By incorp
 orating business context\, threat intelligence\, and exploitability metric
 s\, RBVM enables organizations to allocate resources more efficiently\, re
 duce exposure windows\, and make informed remediation decisions. The talk 
 will explore the key principles of RBVM\, its advantages over legacy model
 s\, and how it empowers organizations to align security efforts with busin
 ess risk\, ultimately strengthening their cybersecurity posture in a dynam
 ic threat landscape.As cyber threats grow in complexity and frequency\, tr
 aditional vulnerability management strategies—centered around volume and
  severity scores—are no longer sufficient. Risk-Based Vulnerability Mana
 gement (RBVM) represents a shift from a reactive to a strategic\, intellig
 ence-driven approach that prioritizes vulnerabilities based on the actual 
 risk they pose to an organization’s assets and operations. By incorporat
 ing business context\, threat intelligence\, and exploitability metrics\, 
 RBVM enables organizations to allocate resources more efficiently\, reduce
  exposure windows\, and make informed remediation decisions. The talk will
  explore the key principles of RBVM\, its advantages over legacy models\, 
 and how it empowers organizations to align security efforts with business 
 risk\, ultimately strengthening their cybersecurity posture in a dynamic t
 hreat landscape.\n\nSpeaker(s): Hina\, \n\nVirtual: https://events.vtools.
 ieee.org/m/488453
LOCATION:Virtual: https://events.vtools.ieee.org/m/488453
ORGANIZER:kdixit@ieee.org
SEQUENCE:20
SUMMARY:Importance Of Risk Based Vulnerability Management - Hina Gandhi 
URL;VALUE=URI:https://events.vtools.ieee.org/m/488453
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Abstract:&lt;/p&gt;\n&lt;p&gt;As cyber threats grow in
  complexity and frequency\, traditional vulnerability management strategie
 s&amp;mdash\;centered around volume and severity scores&amp;mdash\;are no longer s
 ufficient. Risk-Based Vulnerability Management (RBVM) represents a shift f
 rom a reactive to a strategic\, intelligence-driven approach that prioriti
 zes vulnerabilities based on the actual risk they pose to an organization&amp;
 rsquo\;s assets and operations. By incorporating business context\, threat
  intelligence\, and exploitability metrics\, RBVM enables organizations to
  allocate resources more efficiently\, reduce exposure windows\, and make 
 informed remediation decisions. The talk will explore the key principles o
 f RBVM\, its advantages over legacy models\, and how it empowers organizat
 ions to align security efforts with business risk\, ultimately strengtheni
 ng their cybersecurity posture in a dynamic threat landscape.As cyber thre
 ats grow in complexity and frequency\, traditional vulnerability managemen
 t strategies&amp;mdash\;centered around volume and severity scores&amp;mdash\;are 
 no longer sufficient. Risk-Based Vulnerability Management (RBVM) represent
 s a shift from a reactive to a strategic\, intelligence-driven approach th
 at prioritizes vulnerabilities based on the actual risk they pose to an or
 ganization&amp;rsquo\;s assets and operations. By incorporating business conte
 xt\, threat intelligence\, and exploitability metrics\, RBVM enables organ
 izations to allocate resources more efficiently\, reduce exposure windows\
 , and make informed remediation decisions. The talk will explore the key p
 rinciples of RBVM\, its advantages over legacy models\, and how it empower
 s organizations to align security efforts with business risk\, ultimately 
 strengthening their cybersecurity posture in a dynamic threat landscape.&lt;/
 p&gt;
END:VEVENT
END:VCALENDAR

