In this podcast we discuss cybersecurity risk management and vulnerability management, outlining systematic approaches to identify, assess, and address weaknesses in information systems. Several sources, including NIST Special Publication 800-30, detail the fundamental steps of risk assessment, which involve identifying threats, vulnerabilities, and the potential impact and likelihood of their exploitation. Wiz and Splunk elaborate on the lifecycle of vulnerability management, emphasising discovery, prioritisation, remediation, validation, and reporting, often supported by specialised tools and cross-team collaboration. The CISA Known Exploited Vulnerabilities Catalog provides concrete examples of identified vulnerabilities and associated mitigation actions, illustrating the practical application of these concepts. In this discussion, there is a consistent message about the criticality of proactive and ongoing management of cybersecurity risks to protect organisational assets, maintain operational efficiency, and ensure compliance.