Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Risk-Based Vulnerability Management for Cloud Networks - A Proof of Concept on Vulnerability Prioritization Model

LF Networking via YouTube

Overview

Learn about a proof-of-concept vulnerability prioritization model for managing cloud network security risks in this technical conference talk. Explore enterprise-level vulnerability management challenges, particularly in multi-tenant cloud environments where attackers can exploit application vulnerabilities through misconfigurations and insecure APIs. Discover how AI techniques including natural language processing, neuro-symbolic computing, and logic reasoning are integrated to rank high-risk vulnerabilities based on historical threat data. Follow along as speakers demonstrate how their model reduces Common Vulnerability Scoring System remediation work by a factor of 2.89 when tested against real attack data, including top routinely exploited vulnerabilities and APT attack chains. Gain insights into risk definition, model workflow, data processing, evaluation methods, and future developments in cloud security vulnerability management through practical examples and implementation discussions.

Syllabus

Introduction
Vulnerability Management Overview
Cloud Security Challenges
Vulnerability Management Challenges
Vulnerability Management Circle
Define Risk
POC Model
Neural Symbolic Computing
Model Workflow
Data Processing
Running Example
Evaluation Data
Evaluation Results
Future Work
Discussing
Survey
Key difficulties

Taught by

LF Networking

Reviews

Start your review of Risk-Based Vulnerability Management for Cloud Networks - A Proof of Concept on Vulnerability Prioritization Model

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.