Vulnerability Prioritization: Bridging the Gap Between Security and IT | SC Media

Vulnerability Prioritization: Bridging the Gap Between Security and IT

On-Demand Webcast|1 Hour
  • Establishing a single source of truth for vulnerability prioritization between Security and IT
  • Increasing the efficiency of vulnerability remediation efforts with clear data-backed prioritization
  • Defining clear priorities and recommendations for Security and IT to execute to streamline vulnerability management tasks and improve overall security efficacy
  • Saving time, money, and cycles by focusing on the vulnerabilities that will make the most impact

Tom Corn

Senior Vice President, Security Business Unit


Tom Corn leads strategy, product marketing, technical marketing, and evangelism/field CTO team for VMware’s Security Business unit.


Jason Rolleston

Chief Product Officer

Kenna Security

Jason most recently served as Vice President for Security Operations Products at McAfee, where he was responsible for McAfee’s security operations products, including SIEM, endpoint detection and response, behavioral analytics, and sandboxing. Prior to that, he served as Head of Product Management for Enterprise Routing at Cisco and held several senior positions at Symantec. He holds a B.S. in applied physics and a masters in engineering management from Cornell University, and an MBA from the University of Chicago Booth School of Business.