Many organizations’ vulnerability management efforts are designed to slay the paper dragon – focusing on vulnerabilities that pose a high risk in theory. Yet analysis of real world threat actors and their tactics, techniques, and procedures, as well as the vulnerabilities associated with these, demonstrate that this approach only reduces risk on paper. Vulnerability management is not a game of solitaire – there is an adversary dictating the rules of engagement – and the only aspect you control is the battlefield itself, your environment.  In this webinar renown cyber security expert, Dr. Danny Quist, discusses how measuring risk posture and vulnerability criticality change once threat intelligence and risk modelling are taken into account, and how the strategic mitigation of these vulnerabilities can effectively harden your attack surface and reduce your true risk.