This briefing is based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on premises, in the Cloud, and in third-party environments; (2) identification, classification, prioritization, and remediation best practices; (3) standards, charters; (4) organizational structures; and (5) scanning tools.
Kristina Belnap, CISO, HealthEquity – As the SVP, CISO at HealthEquity, I am responsible for overseeing the security and compliance of the company’s data, systems, and operations in the healthcare industry. I have over 15 years of experience in leading and managing security, compliance, BCP/disaster recovery, policy/procedures/plan development, information technology, banking technology regulation, and online gaming regulations project
John Nagencast, Sr. Information Security Architect at Penn National Insurance – John Nagengast, CISSP, MSIT, is a certified security professional currently employed as a Senior Information Security Architect at Penn National Insurance where he has been involved with infrastructure architecture and security design for the past 23 years. As a lead architect within the Information Security Unit, he was responsible for the overall design and implementation of the organization’s
Jeremy Rowley, Vulnerability Management, Lenovo and Motorola Mobility – Jeremy Rowley is a professional with a noteworthy track record in the field of information technology. Jeremy has been a valuable asset to Lenovo’s Vulnerability Management division, demonstrating exceptional expertise and unwavering commitment.