Cloud Data Security & Resilience
,
Cloud Security
,
Governance & Risk Management
Gutsy’s John Morello on Ensuring Vulnerability Management Using Process Mining
Vulnerability management continues to be a daunting challenge for enterprises, with nearly 60% of cyber compromises being attributable to unpatched vulnerabilities and not sophisticated zero-day exploits, said John Morello, co-founder and CTO of Gutsy. Morello explained that many organizations struggle because they are unable to effectively prioritize and remediate issues. This issue, coupled with the complexity of tech stacks and internal processes, leads to dangerous delays in applying critical patches.
See Also: Healthcare in The Cloud: Detecting and Overcoming Threats to Ensure Continuity & Compliance
To address this need, Gutsy provides a comprehensive solution with its process mining capabilities and security process fabric. By integrating data from multiple systems – such as cloud platforms, ticket management and code repositories, Gutsy helps identify “the most important problems”.
“We want to help you not just understand and prioritize what the most important risks are in your environment, but to help you accelerate remediation and drive accountability between all the teams that are part of that by giving you an understanding of not just what’s most important, but what are you doing about it,” Morello said.
In this video interview with Information Security Media Group at Black Hat USA 2024, Morello also discussed:
- How process mining improves visibility in vulnerability management;
- How Gutsy uses security process fabric to enhance traditional vulnerability management;
- How the company plans to use AI technology in vulnerability management.
Morello leads Gutsy’s technology strategy and development efforts. He has nearly 25 years of experience and has worked in major companies including Microsoft, Palo Alto Networks and Twistlock.