Working with TransUnion to Improve Their Remediation Strategy

May 31, 2018
Kenna Security

Share with Your Network

Since 2015, Kenna Security has been working with TransUnion to employ a  risk-based vulnerability management approach using the Kenna Security Platform. Prior to working with us, they had difficulty with communications, especially between the Analysts and IT Operations teams. This can create difficulties for a director since he or she then has to act as a mediator, and at the same time be able to be on top of all real-time risks throughout the network. To make matters worse, their form of communication was via Excel spreadsheets. By trying to track and prioritize their vulnerabilities through Excel, risk management became a miscommunication headache and time sync. Not to mention, their CISO having to try to explain the security landscape to the board was difficult.  

The Kenna Security Platform allowed TransUnion to improve communications between the Analysts and IT Operations teams, making each aware of what vulnerabilities to prioritize, with updated results in real-time. This shared data also helped reduce tension between the teams, which led to better teamwork. It also cut down on the hours and frustration the director had to face when trying to understand the overall security posture at TransUnion. And lastly, the CISO saw a huge, positive shift in the teamwork culture because everyone was aligned on risk throughout the organization.

TransUnion’s story is not rare. If anything, it’s a common situation to see amongst the financial industry when it comes to remediation, since traditional vulnerability management strategies are often more reactive versus proactive like a RBVM approach. And let’s be honest, whenever there is miscommunication and tension between teams, how can they team up on risk to avoid breaches? In addition, Excel spreadsheets are not a strong strategy on tracking and measuring one’s vulnerability management. In today’s age, prioritization while patching in real-time is a necessity. If there is ever a breach, one can lose the trust of their customers, and that’s the last thing anyone wants.

Read more about TransUnion’s story by reading this latest Case Study.

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.