Overview
Syllabus
Intro
Security Response Management
General Security Patch Workflow
Upstream CVE Sources
CVE Workflow: Out-of-order/Delayed
A High Profile CVE - Simplified
Volume of CVE Data: Issues
Volume of CVE Data: Example
Tools: CVE System Analysis
Tools: CVE Build/Source Analysis
Security Management: Issues
Security Management Services
Defect systems vs. Security Management
Cost overview: Necessary costs
Cost overview: Unnecessary costs
Best Practices (2)
Introducing the SRTool
Srtool Features for Best Practices
SRTool: Vulnerability Page Example
SRTool: Object Model
SRTool: Functional Layout
Conclusion
Taught by
Linux Foundation