One place to start is learning the difference between CWEs and CVEs, or weaknesses and vulnerabilities. Once you understand how both can serve as an entryway for attackers, you can start determining the risk tolerance for your organization and prioritizing your efforts accordingly.