Chapter 2: Managing Threats, Vulnerabilities, and Risks

"You can never eliminate all risks – focus on identifying highest risks and mitigate or remove".

– Dianne Johansen - Security IT Director | IBM

As a cybersecurity professional, you will have to deal with a plurality of vulnerabilities, threats, and risks. These three terms are normally used synonymously; however, they are very different, and it is very important that you understand how to approach and manage them.

Now, you need to understand that there are no risk-free systems and your infrastructure and systems could (and will) fail at any time. Therefore, you must be prepared to ensure that your business continues (or resumes) operations if there is a disaster.

In this second chapter, ...

Get Mastering Defensive Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.