re:invent security

Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People


Listen Later

In this episode of Reinvent Security, we dive deep into the world of vulnerability management with Dr. Nikki Robinson, a distinguished cybersecurity expert, author, and educator. With years of experience in IT operations and cybersecurity, Dr. Robinson brings a unique perspective to managing vulnerabilities in today’s ever-evolving threat landscape. During the episode, Dr. Robinson shares her journey from IT operations to earning a doctorate in cybersecurity, highlighting the pivotal moments that shaped her approach to vulnerability management. She emphasizes the importance of looking beyond patching to address the broader aspects of risk reduction, including human factors, automation, and AI. Whether you are a seasoned cybersecurity professional or someone looking to strengthen your organization’s approach to vulnerabilities, this episode is packed with actionable insights and strategies. As a bonus, Dr. Robinson shares her thoughts on the differences between vulnerability management practices in the U.S. and Europe, and how global frameworks like NIST are fostering consistency across borders.


Chapters:

0:00 Introduction

4:31 Nikki’s Journey in Cybersecurity

7:57 Defining Vulnerability Management

10:35 Key takeaways from her book on Effective Vulnerability Management

22:00 First Steps to Mature Vulnerability Management

29:10 Prioritizing Vulnerabilities Beyond CVSS Scores

32:30 Automation in Vulnerability Management

39:15 Governance and Vulnerability Management

44:20 Key Takeaways


Resources:

Dr. Nikki Robinson’s books: Effective Vulnerability Management and Mind the Tech Gap


Security Fatigue: https://www.researchgate.net/publication/361595380_Stress_Burnout_and_Security_Fatigue_in_Cybersecurity_A_Human_Factors_Problem


Human Factors Security Engineering: https://www.tandfonline.com/doi/full/10.1080/07366981.2023.2211429


Human Factors in Cybersecurity: https://dl.acm.org/doi/abs/10.1145/3537674.3555782


Vulnerability Chaining Blog parts 1 and 2: https://blog.stackaware.com/p/vulnerability-chaining-part-1-a-logical


Connect with Nikki: https://www.linkedin.com/in/dr-nikki-robinson/


Subscribe to this channel to find all new episodes:

https://youtube.com/@reinventsecurity?feature=shared


Listen on:

Spotify: https://ap.lc/SzTrY

Apple Podcasts: https://ap.lc/HmXhf


FOLLOW ►

Jeroen Prinse

LinkedIn: https://www.linkedin.com/in/jprinse/


Irfaan Santoe:

LinkedIn: https://www.linkedin.com/in/irfaansantoe/

Hosted on Acast. See acast.com/privacy for more information.

...more
View all episodesView all episodes
Download on the App Store

re:invent securityBy Jeroen Prinse / Irfaan Santoe