Measuring Vulnerability Remediation Strategies with Real-World Data

Measuring Vulnerability Remediation Strategies with Real-World Data

RSA Conference via YouTube Direct link

Weaponization happens quickly

7 of 27

7 of 27

Weaponization happens quickly

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Measuring Vulnerability Remediation Strategies with Real-World Data

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Data-driven cybersecurity research
  3. 3 Core questions for vulnerability remediation
  4. 4 There are A LOT of vulnerabilities
  5. 5 Scope of exposures can be large
  6. 6 On average, firms fix 1 in 10 vulnerabilities
  7. 7 Weaponization happens quickly
  8. 8 Exploitation unfolds gradually
  9. 9 Remediation takes time
  10. 10 Maybe "ALL" vulns isn't the best measure of success
  11. 11 How do we measure "better" or "worse" performance?
  12. 12 Identifying performance factors
  13. 13 Overall VM maturity
  14. 14 Assets under management
  15. 15 VM program budget
  16. 16 VM team structure
  17. 17 Prioritization criteria
  18. 18 CVSS is an objectively poor predictor of exploitation
  19. 19 Remediation deadlines
  20. 20 Process complexity
  21. 21 Patch deployment methods
  22. 22 Summary of performance factors
  23. 23 Strategy makes a huge difference
  24. 24 What do you mean by strategy?
  25. 25 Strategic choices in vulnerability remediation
  26. 26 Exploit prediction improves prioritization
  27. 27 Additional resources for prioritizing vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.