chapter  8
Pages 20

Up to this point, I have discussed the various aspects of vulnerability management (VM) and their relevance to the overall VM process. I have also described the broader role of VM in an organization’s risk management function and maintenance of security posture. Many of the individual stages of implementing VM have been described, such as the development of policies, processes, and requirements. But, what is needed now are a project plan, checklists, and strategies to get the program off the ground.