Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2890,"date":"2024-04-02T22:55:36","date_gmt":"2024-04-02T22:55:36","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/"},"modified":"2024-04-02T22:55:36","modified_gmt":"2024-04-02T22:55:36","slug":"prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/","title":{"rendered":"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm"},"content":{"rendered":"

Record-Breaking Security Vulnerabilities in 2023<\/h2>\n

According to data from Statista<\/a>, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Record-Breaking Security Vulnerabilities in 2023<\/h2>\n

According to data from Statista<\/a>, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is a 16% increase since 2022 and a doubling since 2017. In the first week of 2024 there were 612 vulnerabilities reported.<\/p>\n

This sheer volume of vulnerabilities being released, coupled with the growing costs of cybercrime, is stressing existing operations teams in keeping up with the volume. Doing everything was never possible, and now it\u2019s not even aspirational. Prioritizing time to make the greatest impact is critical in maintaining a strong security posture.<\/p>\n

The Challenge of Vulnerability Remediation<\/h2>\n

Telling teams to remediate vulnerabilities is like telling firefighters to put out forest fires in the southwest during summer. There are always fires; you will never get them all put out. Given budgetary and real-world resource constraints, what is the stack ranked importance of different priorities in which to invest resources for the maximum impact? This is critical as keeping up with this has become a full-time job as financial services seek to remain compliant and secure. It is not practical or possible to immediately address all vulnerabilities in a financial services company\u2019s large heterogeneous IT environments. Prioritization of risk-based vulnerabilities is critical to ensure organizations can manage security risk while managing operational availability.<\/p>\n

Cisco\u2019s Impact on Vulnerability Management<\/h2>\n

Specifically, Fortune 500 financial services companies who use Cisco Vulnerability Management report an 82% reduction in high-risk vulnerabilities after Cisco Vulnerability Management provided a comprehensive view into the context of the vulnerabilities. This is done by tracking Common Vulnerabilities and Exposures (CVE) across the lifecycle, from initial creation to real-world exploitation. This analysis includes the following data sources:<\/p>\n

Open-source databases such as MITRE and the NVD (National Vulnerability Database)
\nOther vulnerability scoring sources like IBM X-Force, Silobreaker, and unique research from renowned research teams
\nEarly warning indicators derived from dark web sources, blogs, social media, and more
\nExploit databases like Exploit DB, Metasploit, GitHub, and others
\nMalware analysis, utilizing data from ReversingLabs to determine if a particular CVE is frequently used by malware
\nInformation on malware families and threat actors
\nData on the volume and velocity of successful exploits observed in the wild<\/p>\n

Significant Reductions in Remediation Efforts<\/h2>\n

Through using the Cisco Vulnerability Management approach, Mattel reported a 50% reduction in time spent on remediation. A global 500 hospitality company reported a 75% reduction in time spent on vulnerability investigation. And Charter reported a 75% reduction in time spent on reporting. Scaling the security teams to prioritized response maximizes the focus on the highest threats, and is the purpose of Cisco Vulnerability management.<\/p>\n

Prioritizing with Volume and Velocity Data<\/h2>\n

The collection of volume and velocity data is particularly crucial for security teams seeking to prioritize vulnerabilities. While most vulnerability management vendors track binary yes\/no indicators of exploitation, Cisco goes beyond that. Our data provides insights into the number of machines exploited by a specific CVE within the past 24 hours, allowing us to assess if a vulnerability is currently more risky compared to previous days.
\nAll of this data is fed into Cisco Vulnerability Management\u2019s machine learning model-based risk scoring, which incorporates our patented exploit prediction capabilities. The result is the Cisco Security Risk Score (formerly the Kenna Risk Score), which informs our customers about the level of risk associated with a vulnerability based on real-world attacker activity.<\/p>\n

Integration with Existing Financial Services Tools<\/h2>\n

Another key value of Cisco\u2019s Vulnerability management approach is the integration with existing tool sets that Financial Services use. Through expanding the capabilities of existing assets already in use, we create additive value to security teams in creating a complimentary solution that provides enumeration of risks from these other tools.<\/p>\n\n

Key Features of Cisco VM specific to regulated financials<\/h2>\n

Cisco Vulnerability management helps financials focus their risk priorities to make the largest impact. It also helps financials in meeting regulatory requirements, such as those present in the PCI guidance and FFIEC regulatory requirements. Some of the areas Cisco VM can help financials meet regulatory requirements include:<\/p>\n

Risk-based Vulnerability Management: Financial institutions are required to manage and mitigate cybersecurity risks. Cisco\u2019s platform uses advanced algorithms to analyze vulnerabilities based on the risk they pose, enabling financial institutions to prioritize and address the most critical threats first, which is often a requirement in financial regulations.
\nCompliance Reporting: Regulatory bodies often require detailed reports on the security posture of financial institutions. Cisco\u2019s platform can generate reports that demonstrate compliance with various regulatory standards, such as the Payment Card Industry Data Security Standard (PCI DSS) and others.
\nThreat Intelligence: Cisco\u2019s platform provides threat intelligence that can help financial institutions stay aware of the latest cybersecurity threats. This intelligence can be used to proactively prepare against against potential attacks, which is in line with the proactive stance expected by many financial regulators.
\nAutomated Asset Discovery: Tracking all assets within a financial institution is critical for compliance. Cisco\u2019s solutions can automatically discover and inventory digital assets, ensuring nothing is overlooked in the vulnerability management process.
\nPatch Effectiveness: Cisco\u2019s platform not only helps prioritize which vulnerabilities to patch but also provides insights into the effectiveness of patches that have been applied. This helps ensure that remediation efforts are successful, essential for maintaining a strong security posture and compliance.
\nIntegrations with Other Security Tools: The integrations listed above are not only important to addressing security but critical for meeting reporting on, tracking, and meeting regulatory requirements. There isn\u2019t one tool that by itself can solve for this, and the integration helps tools focused on audit understand the state of the vulnerability landscape.
\nContinuous Monitoring: Regulatory requirements often mandate continuous monitoring for vulnerabilities and incidents. Cisco\u2019s platform can continuously scan and monitor the environment, providing up-to-date information about the institution\u2019s security state. Through partnerships, the continuous monitoring component can be even stronger and fit into a financial methodology.<\/p>\n

Cisco Vulnerability Management is key to helping financials ensure they are getting the greatest impact out of their security activities through addressing prioritized threats, and ensuring compliance to regulatory requirements.<\/p>\n

For more information on how Cisco can support your financial services needs,<\/h3>\n

explore all of our solutions at\u00a0Cisco for Financial Services<\/a><\/h3>\n
\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Discover how Cisco Vulnerability Management is transforming cybersecurity for financial firms, significantly cutting down high-risk vulnerabilities.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Record-Breaking Security Vulnerabilities in 2023<\/h2>\n

According to data from Statista<\/a>, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Record-Breaking Security Vulnerabilities in 2023<\/h2>\n

According to data from Statista<\/a>, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is a 16% increase since 2022 and a doubling since 2017. In the first week of 2024 there were 612 vulnerabilities reported.<\/p>\n

This sheer volume of vulnerabilities being released, coupled with the growing costs of cybercrime, is stressing existing operations teams in keeping up with the volume. Doing everything was never possible, and now it\u2019s not even aspirational. Prioritizing time to make the greatest impact is critical in maintaining a strong security posture.<\/p>\n

The Challenge of Vulnerability Remediation<\/h2>\n

Telling teams to remediate vulnerabilities is like telling firefighters to put out forest fires in the southwest during summer. There are always fires; you will never get them all put out. Given budgetary and real-world resource constraints, what is the stack ranked importance of different priorities in which to invest resources for the maximum impact? This is critical as keeping up with this has become a full-time job as financial services seek to remain compliant and secure. It is not practical or possible to immediately address all vulnerabilities in a financial services company\u2019s large heterogeneous IT environments. Prioritization of risk-based vulnerabilities is critical to ensure organizations can manage security risk while managing operational availability.<\/p>\n

Cisco\u2019s Impact on Vulnerability Management<\/h2>\n

Specifically, Fortune 500 financial services companies who use Cisco Vulnerability Management report an 82% reduction in high-risk vulnerabilities after Cisco Vulnerability Management provided a comprehensive view into the context of the vulnerabilities. This is done by tracking Common Vulnerabilities and Exposures (CVE) across the lifecycle, from initial creation to real-world exploitation. This analysis includes the following data sources:<\/p>\n

Open-source databases such as MITRE and the NVD (National Vulnerability Database)
\nOther vulnerability scoring sources like IBM X-Force, Silobreaker, and unique research from renowned research teams
\nEarly warning indicators derived from dark web sources, blogs, social media, and more
\nExploit databases like Exploit DB, Metasploit, GitHub, and others
\nMalware analysis, utilizing data from ReversingLabs to determine if a particular CVE is frequently used by malware
\nInformation on malware families and threat actors
\nData on the volume and velocity of successful exploits observed in the wild<\/p>\n

Significant Reductions in Remediation Efforts<\/h2>\n

Through using the Cisco Vulnerability Management approach, Mattel reported a 50% reduction in time spent on remediation. A global 500 hospitality company reported a 75% reduction in time spent on vulnerability investigation. And Charter reported a 75% reduction in time spent on reporting. Scaling the security teams to prioritized response maximizes the focus on the highest threats, and is the purpose of Cisco Vulnerability management.<\/p>\n

Prioritizing with Volume and Velocity Data<\/h2>\n

The collection of volume and velocity data is particularly crucial for security teams seeking to prioritize vulnerabilities. While most vulnerability management vendors track binary yes\/no indicators of exploitation, Cisco goes beyond that. Our data provides insights into the number of machines exploited by a specific CVE within the past 24 hours, allowing us to assess if a vulnerability is currently more risky compared to previous days.
\nAll of this data is fed into Cisco Vulnerability Management\u2019s machine learning model-based risk scoring, which incorporates our patented exploit prediction capabilities. The result is the Cisco Security Risk Score (formerly the Kenna Risk Score), which informs our customers about the level of risk associated with a vulnerability based on real-world attacker activity.<\/p>\n

Integration with Existing Financial Services Tools<\/h2>\n

Another key value of Cisco\u2019s Vulnerability management approach is the integration with existing tool sets that Financial Services use. Through expanding the capabilities of existing assets already in use, we create additive value to security teams in creating a complimentary solution that provides enumeration of risks from these other tools.<\/p>\n

Key Features of Cisco VM specific to regulated financials<\/h2>\n

Cisco Vulnerability management helps financials focus their risk priorities to make the largest impact. It also helps financials in meeting regulatory requirements, such as those present in the PCI guidance and FFIEC regulatory requirements. Some of the areas Cisco VM can help financials meet regulatory requirements include:<\/p>\n

Risk-based Vulnerability Management: Financial institutions are required to manage and mitigate cybersecurity risks. Cisco\u2019s platform uses advanced algorithms to analyze vulnerabilities based on the risk they pose, enabling financial institutions to prioritize and address the most critical threats first, which is often a requirement in financial regulations.
\nCompliance Reporting: Regulatory bodies often require detailed reports on the security posture of financial institutions. Cisco\u2019s platform can generate reports that demonstrate compliance with various regulatory standards, such as the Payment Card Industry Data Security Standard (PCI DSS) and others.
\nThreat Intelligence: Cisco\u2019s platform provides threat intelligence that can help financial institutions stay aware of the latest cybersecurity threats. This intelligence can be used to proactively prepare against against potential attacks, which is in line with the proactive stance expected by many financial regulators.
\nAutomated Asset Discovery: Tracking all assets within a financial institution is critical for compliance. Cisco\u2019s solutions can automatically discover and inventory digital assets, ensuring nothing is overlooked in the vulnerability management process.
\nPatch Effectiveness: Cisco\u2019s platform not only helps prioritize which vulnerabilities to patch but also provides insights into the effectiveness of patches that have been applied. This helps ensure that remediation efforts are successful, essential for maintaining a strong security posture and compliance.
\nIntegrations with Other Security Tools: The integrations listed above are not only important to addressing security but critical for meeting reporting on, tracking, and meeting regulatory requirements. There isn\u2019t one tool that by itself can solve for this, and the integration helps tools focused on audit understand the state of the vulnerability landscape.
\nContinuous Monitoring: Regulatory requirements often mandate continuous monitoring for vulnerabilities and incidents. Cisco\u2019s platform can continuously scan and monitor the environment, providing up-to-date information about the institution\u2019s security state. Through partnerships, the continuous monitoring component can be even stronger and fit into a financial methodology.<\/p>\n

Cisco Vulnerability Management is key to helping financials ensure they are getting the greatest impact out of their security activities through addressing prioritized threats, and ensuring compliance to regulatory requirements.<\/p>\n

For more information on how Cisco can support your financial services needs,<\/h3>\n

explore all of our solutions at\u00a0Cisco for Financial Services<\/a><\/h3>\n
\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Discover how Cisco Vulnerability Management is transforming cybersecurity for financial firms, significantly cutting down high-risk vulnerabilities.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2891,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nPrioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm\" \/>\n<meta property=\"og:description\" content=\"Record-Breaking Security Vulnerabilities in 2023 According to data from Statista, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is\u2026 Read more on Cisco Blogs \u200b[[{"value":" Record-Breaking Security Vulnerabilities in 2023 According to data from Statista, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is a 16% increase since 2022 and a doubling since 2017. In the first week of 2024 there were 612 vulnerabilities reported. This sheer volume of vulnerabilities being released, coupled with the growing costs of cybercrime, is stressing existing operations teams in keeping up with the volume. Doing everything was never possible, and now it\u2019s not even aspirational. Prioritizing time to make the greatest impact is critical in maintaining a strong security posture. The Challenge of Vulnerability Remediation Telling teams to remediate vulnerabilities is like telling firefighters to put out forest fires in the southwest during summer. There are always fires; you will never get them all put out. Given budgetary and real-world resource constraints, what is the stack ranked importance of different priorities in which to invest resources for the maximum impact? This is critical as keeping up with this has become a full-time job as financial services seek to remain compliant and secure. It is not practical or possible to immediately address all vulnerabilities in a financial services company\u2019s large heterogeneous IT environments. Prioritization of risk-based vulnerabilities is critical to ensure organizations can manage security risk while managing operational availability. Cisco\u2019s Impact on Vulnerability Management Specifically, Fortune 500 financial services companies who use Cisco Vulnerability Management report an 82% reduction in high-risk vulnerabilities after Cisco Vulnerability Management provided a comprehensive view into the context of the vulnerabilities. This is done by tracking Common Vulnerabilities and Exposures (CVE) across the lifecycle, from initial creation to real-world exploitation. This analysis includes the following data sources: Open-source databases such as MITRE and the NVD (National Vulnerability Database) Other vulnerability scoring sources like IBM X-Force, Silobreaker, and unique research from renowned research teams Early warning indicators derived from dark web sources, blogs, social media, and more Exploit databases like Exploit DB, Metasploit, GitHub, and others Malware analysis, utilizing data from ReversingLabs to determine if a particular CVE is frequently used by malware Information on malware families and threat actors Data on the volume and velocity of successful exploits observed in the wild Significant Reductions in Remediation Efforts Through using the Cisco Vulnerability Management approach, Mattel reported a 50% reduction in time spent on remediation. A global 500 hospitality company reported a 75% reduction in time spent on vulnerability investigation. And Charter reported a 75% reduction in time spent on reporting. Scaling the security teams to prioritized response maximizes the focus on the highest threats, and is the purpose of Cisco Vulnerability management. Prioritizing with Volume and Velocity Data The collection of volume and velocity data is particularly crucial for security teams seeking to prioritize vulnerabilities. While most vulnerability management vendors track binary yes\/no indicators of exploitation, Cisco goes beyond that. Our data provides insights into the number of machines exploited by a specific CVE within the past 24 hours, allowing us to assess if a vulnerability is currently more risky compared to previous days. All of this data is fed into Cisco Vulnerability Management\u2019s machine learning model-based risk scoring, which incorporates our patented exploit prediction capabilities. The result is the Cisco Security Risk Score (formerly the Kenna Risk Score), which informs our customers about the level of risk associated with a vulnerability based on real-world attacker activity. Integration with Existing Financial Services Tools Another key value of Cisco\u2019s Vulnerability management approach is the integration with existing tool sets that Financial Services use. Through expanding the capabilities of existing assets already in use, we create additive value to security teams in creating a complimentary solution that provides enumeration of risks from these other tools. Key Features of Cisco VM specific to regulated financials Cisco Vulnerability management helps financials focus their risk priorities to make the largest impact. It also helps financials in meeting regulatory requirements, such as those present in the PCI guidance and FFIEC regulatory requirements. Some of the areas Cisco VM can help financials meet regulatory requirements include: Risk-based Vulnerability Management: Financial institutions are required to manage and mitigate cybersecurity risks. Cisco\u2019s platform uses advanced algorithms to analyze vulnerabilities based on the risk they pose, enabling financial institutions to prioritize and address the most critical threats first, which is often a requirement in financial regulations. Compliance Reporting: Regulatory bodies often require detailed reports on the security posture of financial institutions. Cisco\u2019s platform can generate reports that demonstrate compliance with various regulatory standards, such as the Payment Card Industry Data Security Standard (PCI DSS) and others. Threat Intelligence: Cisco\u2019s platform provides threat intelligence that can help financial institutions stay aware of the latest cybersecurity threats. This intelligence can be used to proactively prepare against against potential attacks, which is in line with the proactive stance expected by many financial regulators. Automated Asset Discovery: Tracking all assets within a financial institution is critical for compliance. Cisco\u2019s solutions can automatically discover and inventory digital assets, ensuring nothing is overlooked in the vulnerability management process. Patch Effectiveness: Cisco\u2019s platform not only helps prioritize which vulnerabilities to patch but also provides insights into the effectiveness of patches that have been applied. This helps ensure that remediation efforts are successful, essential for maintaining a strong security posture and compliance. Integrations with Other Security Tools: The integrations listed above are not only important to addressing security but critical for meeting reporting on, tracking, and meeting regulatory requirements. There isn\u2019t one tool that by itself can solve for this, and the integration helps tools focused on audit understand the state of the vulnerability landscape. Continuous Monitoring: Regulatory requirements often mandate continuous monitoring for vulnerabilities and incidents. Cisco\u2019s platform can continuously scan and monitor the environment, providing up-to-date information about the institution\u2019s security state. Through partnerships, the continuous monitoring component can be even stronger and fit into a financial methodology. Cisco Vulnerability Management is key to helping financials ensure they are getting the greatest impact out of their security activities through addressing prioritized threats, and ensuring compliance to regulatory requirements. For more information on how Cisco can support your financial services needs, explore all of our solutions at\u00a0Cisco for Financial Services Share Share: "}]]\u00a0\u00a0Discover how Cisco Vulnerability Management is transforming cybersecurity for financial firms, significantly cutting down high-risk vulnerabilities.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-02T22:55:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm\",\"datePublished\":\"2024-04-02T22:55:36+00:00\",\"dateModified\":\"2024-04-02T22:55:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/\"},\"wordCount\":1093,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/\",\"name\":\"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif\",\"datePublished\":\"2024-04-02T22:55:36+00:00\",\"dateModified\":\"2024-04-02T22:55:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/","og_locale":"en_US","og_type":"article","og_title":"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm","og_description":"Record-Breaking Security Vulnerabilities in 2023 According to data from Statista, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is\u2026 Read more on Cisco Blogs \u200b[[{\"value\":\" Record-Breaking Security Vulnerabilities in 2023 According to data from Statista, the amount of vulnerabilities recorded in 2023 hit a record number with 29,000 new vulnerabilities reported. This is a 16% increase since 2022 and a doubling since 2017. In the first week of 2024 there were 612 vulnerabilities reported. This sheer volume of vulnerabilities being released, coupled with the growing costs of cybercrime, is stressing existing operations teams in keeping up with the volume. Doing everything was never possible, and now it\u2019s not even aspirational. Prioritizing time to make the greatest impact is critical in maintaining a strong security posture. The Challenge of Vulnerability Remediation Telling teams to remediate vulnerabilities is like telling firefighters to put out forest fires in the southwest during summer. There are always fires; you will never get them all put out. Given budgetary and real-world resource constraints, what is the stack ranked importance of different priorities in which to invest resources for the maximum impact? This is critical as keeping up with this has become a full-time job as financial services seek to remain compliant and secure. It is not practical or possible to immediately address all vulnerabilities in a financial services company\u2019s large heterogeneous IT environments. Prioritization of risk-based vulnerabilities is critical to ensure organizations can manage security risk while managing operational availability. Cisco\u2019s Impact on Vulnerability Management Specifically, Fortune 500 financial services companies who use Cisco Vulnerability Management report an 82% reduction in high-risk vulnerabilities after Cisco Vulnerability Management provided a comprehensive view into the context of the vulnerabilities. This is done by tracking Common Vulnerabilities and Exposures (CVE) across the lifecycle, from initial creation to real-world exploitation. This analysis includes the following data sources: Open-source databases such as MITRE and the NVD (National Vulnerability Database) Other vulnerability scoring sources like IBM X-Force, Silobreaker, and unique research from renowned research teams Early warning indicators derived from dark web sources, blogs, social media, and more Exploit databases like Exploit DB, Metasploit, GitHub, and others Malware analysis, utilizing data from ReversingLabs to determine if a particular CVE is frequently used by malware Information on malware families and threat actors Data on the volume and velocity of successful exploits observed in the wild Significant Reductions in Remediation Efforts Through using the Cisco Vulnerability Management approach, Mattel reported a 50% reduction in time spent on remediation. A global 500 hospitality company reported a 75% reduction in time spent on vulnerability investigation. And Charter reported a 75% reduction in time spent on reporting. Scaling the security teams to prioritized response maximizes the focus on the highest threats, and is the purpose of Cisco Vulnerability management. Prioritizing with Volume and Velocity Data The collection of volume and velocity data is particularly crucial for security teams seeking to prioritize vulnerabilities. While most vulnerability management vendors track binary yes\/no indicators of exploitation, Cisco goes beyond that. Our data provides insights into the number of machines exploited by a specific CVE within the past 24 hours, allowing us to assess if a vulnerability is currently more risky compared to previous days. All of this data is fed into Cisco Vulnerability Management\u2019s machine learning model-based risk scoring, which incorporates our patented exploit prediction capabilities. The result is the Cisco Security Risk Score (formerly the Kenna Risk Score), which informs our customers about the level of risk associated with a vulnerability based on real-world attacker activity. Integration with Existing Financial Services Tools Another key value of Cisco\u2019s Vulnerability management approach is the integration with existing tool sets that Financial Services use. Through expanding the capabilities of existing assets already in use, we create additive value to security teams in creating a complimentary solution that provides enumeration of risks from these other tools. Key Features of Cisco VM specific to regulated financials Cisco Vulnerability management helps financials focus their risk priorities to make the largest impact. It also helps financials in meeting regulatory requirements, such as those present in the PCI guidance and FFIEC regulatory requirements. Some of the areas Cisco VM can help financials meet regulatory requirements include: Risk-based Vulnerability Management: Financial institutions are required to manage and mitigate cybersecurity risks. Cisco\u2019s platform uses advanced algorithms to analyze vulnerabilities based on the risk they pose, enabling financial institutions to prioritize and address the most critical threats first, which is often a requirement in financial regulations. Compliance Reporting: Regulatory bodies often require detailed reports on the security posture of financial institutions. Cisco\u2019s platform can generate reports that demonstrate compliance with various regulatory standards, such as the Payment Card Industry Data Security Standard (PCI DSS) and others. Threat Intelligence: Cisco\u2019s platform provides threat intelligence that can help financial institutions stay aware of the latest cybersecurity threats. This intelligence can be used to proactively prepare against against potential attacks, which is in line with the proactive stance expected by many financial regulators. Automated Asset Discovery: Tracking all assets within a financial institution is critical for compliance. Cisco\u2019s solutions can automatically discover and inventory digital assets, ensuring nothing is overlooked in the vulnerability management process. Patch Effectiveness: Cisco\u2019s platform not only helps prioritize which vulnerabilities to patch but also provides insights into the effectiveness of patches that have been applied. This helps ensure that remediation efforts are successful, essential for maintaining a strong security posture and compliance. Integrations with Other Security Tools: The integrations listed above are not only important to addressing security but critical for meeting reporting on, tracking, and meeting regulatory requirements. There isn\u2019t one tool that by itself can solve for this, and the integration helps tools focused on audit understand the state of the vulnerability landscape. Continuous Monitoring: Regulatory requirements often mandate continuous monitoring for vulnerabilities and incidents. Cisco\u2019s platform can continuously scan and monitor the environment, providing up-to-date information about the institution\u2019s security state. Through partnerships, the continuous monitoring component can be even stronger and fit into a financial methodology. Cisco Vulnerability Management is key to helping financials ensure they are getting the greatest impact out of their security activities through addressing prioritized threats, and ensuring compliance to regulatory requirements. For more information on how Cisco can support your financial services needs, explore all of our solutions at\u00a0Cisco for Financial Services Share Share: \"}]]\u00a0\u00a0Discover how Cisco Vulnerability Management is transforming cybersecurity for financial firms, significantly cutting down high-risk vulnerabilities.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/","og_site_name":"JHC","article_published_time":"2024-04-02T22:55:36+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/"},"author":{"name":"","@id":""},"headline":"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm","datePublished":"2024-04-02T22:55:36+00:00","dateModified":"2024-04-02T22:55:36+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/"},"wordCount":1093,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/","url":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/","name":"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif","datePublished":"2024-04-02T22:55:36+00:00","dateModified":"2024-04-02T22:55:36+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/04\/16638142-F3KeXX.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/prioritizing-risk-based-vulnerability-compliance-for-financial-institutions-on-april-2-2024-at-100-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Prioritizing risk based vulnerability compliance for Financial Institutions on April 2, 2024 at 1:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2890"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2890\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2891"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}