Listen "Dr. Nikki Robinson (IBM) on Effective Vulnerability Management: Beyond Tools, Towards People"
Episode Synopsis
In this episode of Reinvent Security, we dive deep into the world of vulnerability management with Dr. Nikki Robinson, a distinguished cybersecurity expert, author, and educator. With years of experience in IT operations and cybersecurity, Dr. Robinson brings a unique perspective to managing vulnerabilities in today’s ever-evolving threat landscape. During the episode, Dr. Robinson shares her journey from IT operations to earning a doctorate in cybersecurity, highlighting the pivotal moments that shaped her approach to vulnerability management. She emphasizes the importance of looking beyond patching to address the broader aspects of risk reduction, including human factors, automation, and AI. Whether you are a seasoned cybersecurity professional or someone looking to strengthen your organization’s approach to vulnerabilities, this episode is packed with actionable insights and strategies. As a bonus, Dr. Robinson shares her thoughts on the differences between vulnerability management practices in the U.S. and Europe, and how global frameworks like NIST are fostering consistency across borders.Chapters:0:00 Introduction4:31 Nikki’s Journey in Cybersecurity7:57 Defining Vulnerability Management10:35 Key takeaways from her book on Effective Vulnerability Management22:00 First Steps to Mature Vulnerability Management29:10 Prioritizing Vulnerabilities Beyond CVSS Scores32:30 Automation in Vulnerability Management39:15 Governance and Vulnerability Management44:20 Key TakeawaysResources:Dr. Nikki Robinson’s books: Effective Vulnerability Management and Mind the Tech GapSecurity Fatigue: https://www.researchgate.net/publication/361595380_Stress_Burnout_and_Security_Fatigue_in_Cybersecurity_A_Human_Factors_ProblemHuman Factors Security Engineering: https://www.tandfonline.com/doi/full/10.1080/07366981.2023.2211429Human Factors in Cybersecurity: https://dl.acm.org/doi/abs/10.1145/3537674.3555782Vulnerability Chaining Blog parts 1 and 2: https://blog.stackaware.com/p/vulnerability-chaining-part-1-a-logical Connect with Nikki: https://www.linkedin.com/in/dr-nikki-robinson/Subscribe to this channel to find all new episodes:https://youtube.com/@reinventsecurity?feature=sharedListen on:Spotify: https://ap.lc/SzTrYApple Podcasts: https://ap.lc/HmXhfFOLLOW ►Jeroen PrinseLinkedIn: https://www.linkedin.com/in/jprinse/Irfaan Santoe:LinkedIn: https://www.linkedin.com/in/irfaansantoe/ Hosted on Acast. See acast.com/privacy for more information.
More episodes of the podcast re:invent security
Patric Versteeg (Heerema): Lead From Within — Personal Leadership for CISOs, Teams & Boards
25/09/2025
Laurens Jagt (CSD) & Medea de Jong (Sonepar): “Build cyber security teams that actually thrive”
31/07/2025
Arnaud Wiehe (FedEx) & Tiago Teles (ABN Amro): “The Next-Gen CISO Must Stay Curious, or Fall Behind”
26/06/2025
Petra Oldengarm (CVN): “Digital Sovereignty Starts With Smart Dependence, Not Full Independence”
28/05/2025
Esther Schagen-van Luit (Microsoft): "Security leadership requires courage and curiosity"
27/03/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.