Overview
Syllabus
Intro
Data-driven cybersecurity research
Core questions for vulnerability remediation
There are A LOT of vulnerabilities
Scope of exposures can be large
On average, firms fix 1 in 10 vulnerabilities
Weaponization happens quickly
Exploitation unfolds gradually
Remediation takes time
Maybe "ALL" vulns isn't the best measure of success
How do we measure "better" or "worse" performance?
Identifying performance factors
Overall VM maturity
Assets under management
VM program budget
VM team structure
Prioritization criteria
CVSS is an objectively poor predictor of exploitation
Remediation deadlines
Process complexity
Patch deployment methods
Summary of performance factors
Strategy makes a huge difference
What do you mean by strategy?
Strategic choices in vulnerability remediation
Exploit prediction improves prioritization
Additional resources for prioritizing vulnerabilities
Taught by
RSA Conference