Vulnerability Management
Solvay is adopting a Vulnerability Management Process using a Vulnerability Management Lifecycle
and including:
- Governance structure
- Design processes
- Defined roles and responsibilities
- Appropriate tools
This will help Solvay to identify, quantify and prioritize remediation of vulnerabilities, as well as track remediation progress.
Our Mission?
- Detect vulnerabilities across Solvay’s environment
- Provide asset operating teams reports with remediations that need to be applied
- Prioritize the remediation actions based on risk reduction
- Provide additional feedback and support when needed
- Create dashboards for both security managers and operating teams with overview of the Solvey assets vulnerability status
What is a vulnerability?
A vulnerability is a cybersecurity weakness that a bad actor could exploit to gain unauthorized access to your enterprise network and compromise resources. The vulnerability could be present in unpatched or out-of-date software, or occur due to missing or weak authentication credentials. System misconfigurations, poor data encryption, malicious insider threats, injection flaws and zero-day vulnerabilities are some other, common types.
If an attacker successfully exploits a vulnerability, they can damage your organization in many ways. Here are a few examples:
- Run malicious code on your systems, such as ransomware
- Install dangerous malware
- Steal sensitive data
- Conduct corporate espionage
What is Vulnerability Management?
- Vulnerability management as a “process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization.
- Focused assessments on the adequacy and implementation of technical, operational, and management security controls
What is the Vulnerability Management Cycle?
Discover assets | Prepare an asset inventory for monitoring. |
Prioritize enterprise assets | Prioritize assets based on the potential impact of a vulnerability’s exploitation (identify business-critical assets). |
Find and assess vulnerabilities | Identify vulnerabilities using vulnerability scanner software (CrowdStrike, Qualys, etc.) |
Prioritize and report vulnerabilities | Prioritize identified vulnerabilities based on potential impact and risk, prepare a detailed report |
Address vulnerabilities | Address vulnerabilities based on priority (apply security patches, upgrade software, etc.) |
Verify remediation | Assess where remediation actions were successful |
Continuous improvement | Maintain the cycle of excellence through feedback and continuous improvement |
What is the scope of Vulnerability Assessment?
- Workstations and Servers (O/S, Middleware, Tools)
- Business Applications
- Network devices
- IoT, Industrial Control Systems
How to Contact VOC (Vulnerability Operations Center)?
Email to:

