Vulnerability Management
Get Started
Vulnerability scans can be requested by emailing [email protected]
Features
The GW Information Security (GW IS) team performs vulnerability scanning to identify vulnerabilities in GW's network based IT resources. The end goal is to measure and share with system and service owners cybersecurity risks that a threat actor might exploit and risk remediation recommendations.
Resources
Support
Available to
- Faculty
- Staff