Discussion
Examine the effectiveness of vulnerability management programs of organizations when utilizing third party vendors for threat intel or vulnerability scanning and/or device patching. Breach or incident reports are useful for this exercise.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.