Overview
Explore the dynamic world of cybersecurity intelligence in this 22-minute conference talk from BSidesLV. Dive into the Known Exploited Vulnerabilities (KEV) catalog, initially developed by the Cybersecurity and Infrastructure Security Agency (CISA) for government use but now widely adopted across industries. Uncover hidden insights within this treasure trove of exploit intelligence and gain a fresh perspective on prioritizing vulnerabilities in today's ever-evolving threat landscape. Learn how to leverage the KEV catalog to enhance your organization's cybersecurity posture and make informed decisions about vulnerability management. Speaker Glenn Thorpe shares valuable expertise to help you navigate the complex world of vulnerability intelligence and stay ahead of potential threats.
Syllabus
Ground Floor, Wed, Aug 7, 16:30 - Wed, Aug 7, CDT
Taught by
BSidesLV