In order to solve many advanced information security use cases, one must correlate historical vulnerability scanning information alongside information garnered from other security technologies such as SIEMs, Ticketing, IDS/IPS, NAC, Deception technologies, and many others. However, to best achieve these use cases, a difficult correlation challenge related to normal IT changes across time, must be overcome. This session covers three specific advanced security use cases achieved by integrating vulnerability management, with other security technologies. The session includes a demonstration of use case related to an incident response program, and solved by a security technology.
A graduate from The University of Texas at San Antonio with a degree in computer science. Currently working as an API integrations developer for Digital Defense Inc.
From Tucson, Arizona. This is my first year at Digital Defense after a four month internship working on web development for their Enterprise Risk Assessment tool. Currently signed onto their Integrations Team as a Software Engineer.