The Etiology of Vulnerability Exploitation

The Etiology of Vulnerability Exploitation

RSA Conference via YouTube Direct link

Data Sources

3 of 18

3 of 18

Data Sources

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Etiology of Vulnerability Exploitation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Today's Journey...
  3. 3 Data Sources
  4. 4 Simplified View of Vulnerabilities
  5. 5 Things Happen Quick
  6. 6 Is CVSS used to prioritize IRL?
  7. 7 The Vendor Role in Remediation?
  8. 8 Top 3 Vendors
  9. 9 Top Products going unpatched
  10. 10 Probability of Patching
  11. 11 The Case for Auto-Patching
  12. 12 Measuring Remediation Decisions
  13. 13 Measuring Decisions: CVSS 10
  14. 14 Vendor-based Strategy
  15. 15 Predictive Model
  16. 16 What contributes to exploitation in the wild?
  17. 17 Predicting Probability: "well calibrated"
  18. 18 RSAConference 2019 San Francisco March 4-8 Moscone Center

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.