Completed
Weaponization happens quickly
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Measuring Vulnerability Remediation Strategies with Real-World Data
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Data-driven cybersecurity research
- 3 Core questions for vulnerability remediation
- 4 There are A LOT of vulnerabilities
- 5 Scope of exposures can be large
- 6 On average, firms fix 1 in 10 vulnerabilities
- 7 Weaponization happens quickly
- 8 Exploitation unfolds gradually
- 9 Remediation takes time
- 10 Maybe "ALL" vulns isn't the best measure of success
- 11 How do we measure "better" or "worse" performance?
- 12 Identifying performance factors
- 13 Overall VM maturity
- 14 Assets under management
- 15 VM program budget
- 16 VM team structure
- 17 Prioritization criteria
- 18 CVSS is an objectively poor predictor of exploitation
- 19 Remediation deadlines
- 20 Process complexity
- 21 Patch deployment methods
- 22 Summary of performance factors
- 23 Strategy makes a huge difference
- 24 What do you mean by strategy?
- 25 Strategic choices in vulnerability remediation
- 26 Exploit prediction improves prioritization
- 27 Additional resources for prioritizing vulnerabilities