The Etiology of Vulnerability Exploitation

The Etiology of Vulnerability Exploitation

RSA Conference via YouTube Direct link

Today's Journey...

2 of 18

2 of 18

Today's Journey...

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

The Etiology of Vulnerability Exploitation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Today's Journey...
  3. 3 Data Sources
  4. 4 Simplified View of Vulnerabilities
  5. 5 Things Happen Quick
  6. 6 Is CVSS used to prioritize IRL?
  7. 7 The Vendor Role in Remediation?
  8. 8 Top 3 Vendors
  9. 9 Top Products going unpatched
  10. 10 Probability of Patching
  11. 11 The Case for Auto-Patching
  12. 12 Measuring Remediation Decisions
  13. 13 Measuring Decisions: CVSS 10
  14. 14 Vendor-based Strategy
  15. 15 Predictive Model
  16. 16 What contributes to exploitation in the wild?
  17. 17 Predicting Probability: "well calibrated"
  18. 18 RSAConference 2019 San Francisco March 4-8 Moscone Center

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.