Risk-Based Vulnerability Management for Cloud Networks - A Proof of Concept on Vulnerability Prioritization Model
LF Networking via YouTube
Overview
Learn about a proof-of-concept vulnerability prioritization model for managing cloud network security risks in this technical conference talk. Explore enterprise-level vulnerability management challenges, particularly in multi-tenant cloud environments where attackers can exploit application vulnerabilities through misconfigurations and insecure APIs. Discover how AI techniques including natural language processing, neuro-symbolic computing, and logic reasoning are integrated to rank high-risk vulnerabilities based on historical threat data. Follow along as speakers demonstrate how their model reduces Common Vulnerability Scoring System remediation work by a factor of 2.89 when tested against real attack data, including top routinely exploited vulnerabilities and APT attack chains. Gain insights into risk definition, model workflow, data processing, evaluation methods, and future developments in cloud security vulnerability management through practical examples and implementation discussions.
Syllabus
Introduction
Vulnerability Management Overview
Cloud Security Challenges
Vulnerability Management Challenges
Vulnerability Management Circle
Define Risk
POC Model
Neural Symbolic Computing
Model Workflow
Data Processing
Running Example
Evaluation Data
Evaluation Results
Future Work
Discussing
Survey
Key difficulties
Taught by
LF Networking