2015 is still young, and we already have to deal with yet another brandedvulnerability affecting large numbers of systems. Likely, this isn't the last time that this will happen. In this presentation, we will explain what Ghost was all about, how to recognize vulnerable systems and what can be done to mitigate the risk. We will also look beyond Ghost to explain what can be done to quickly assess your organizations exposure from the latest news worthy vulnerability and how to build a comprehensive framework to address high priority vulnerabilities.