Contact Us
aanya in dress hexagon shape 2022-02-2 aanya in dress hexagon shape 2022-02-2

Vulnerability Response

Compress the traditional project timeline with an accelerated Vulnerability Response implementation that boosts business maturity and generates tangible value in weeks. 

Blueprint Overview

3 WEEKS
arrow

Initiate & Plan

4 WEEKS
arrow

Execute

1 WEEK
arrow

Deliver

1 WEEK
arrow

Go-Live & Beyond

Initiate & Plan

3 WEEKS
arrow

Demo Vulnerability Response, collect requirements and deliver stories for acceptance.

6 HRS Product Owner
10 HRS Scrum Master
20 HRS Development Team
5 HRS Customer Stakeholders
5 HRS Acceptance Testers
Weekly hours by role

Execute

4 WEEKS
arrow

Configure Vulnerability Response as per best practice and customer requirements; continually show progress back to the customer and collect new requirements.

4 HRS Product Owner
8 HRS Scrum Master
35 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Deliver

1 WEEK
arrow

Provide functional and technical knowledge transfer and support customer acceptance testers.

12 HRS Product Owner
14 HRS Scrum Master
44 HRS Development Team
10 HRS Customer Stakeholders
16 HRS Acceptance Testers
Weekly hours by role

Go-Live & Beyond

1 WEEK
arrow

Promote code to production and provide Hyper-Care.

4 HRS Product Owner
8 HRS Scrum Master
20 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Thirdera Staffing

role icon

Engagement Manager

Responsible for providing leadership and direction to achieve growth and transformation.

role icon

Technical Lead

Analyses business requirements and provides system design while implementing system solutions.

role icon

Supporting Team as appropriate

Skilled resources will be assigned as needed to ensure the implementation meets your project objectives in the 8-week delivery timeframe.

angelo with briefcase pointing-2023-03 angelo with briefcase pointing-2023-03

Project Scope

Thirdera's Vulnerability Response Blueprint includes a robust list of deliverables to set your Security program on course for long-term success. Guided by proven best practices, our team of advisory and technical experts configures and implements a solution best fit for your unique needs while establishing a foundation of knowledge to promote ongoing maturation. Key deliverables include:

  • One pre-built or file-feed scanner integration
  • Assest/CI data matching from scanner to enrich the CMDB
  • Exception and Deferral Workflow
  • Automated risk score, severity, and remediation target calculations
  • Vulnerability grouping and auto-assignment
  • Notifications, reports, and dashboards
  • Automate creation of change requests from remediation targets
  • Configuration of Vulnerability Response Workspaces
  • Watch Topic creation
  • Functional Overview, Technical Knowledge Transfer, UAT Support

Outcomes

 

Consolidated View

A single view using Vulnerability Workspaces to assess overall health including Watch Topics for targeted visualisations and trending
Icon-Approval

Elevated Operational Efficiency

Improved efficiency through cross-source prioritisation, logical grouping, and automated assignment
Icon-Approval

Seamless Workflows

Increased consistency and simplicity with deferral workflows and automated remediation targets
Icon-Approval

Automated Feedback Loop

Faster feedback with automated rescan on vulnerability closure
Icon-Approval

Improved Data Quality

Enriched vulnerability information with your ServiceNow CMDB (and vice-versa)
Icon-Approval

Reduced Time to Resolution

Targeted Remediation Efforts to assign to IT teams to address vulnerabilities

Let's get started

 

Connect with our Security Operations experts for a detailed look at what an assessment would look like at your organization and how to improve your cyber resilience and Vulnerability Response processes. 

 

Get in touch