YoVDO

Discovering Hidden Vulnerability Intelligence in CISA's KEV Catalog

Offered By: BSidesLV via YouTube

Tags

Vulnerability Management Courses CISA Certification Courses Threat Landscape Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the dynamic world of cybersecurity intelligence in this 22-minute conference talk from BSidesLV. Dive into the Known Exploited Vulnerabilities (KEV) catalog, initially developed by the Cybersecurity and Infrastructure Security Agency (CISA) for government use but now widely adopted across industries. Uncover hidden insights within this treasure trove of exploit intelligence and gain a fresh perspective on prioritizing vulnerabilities in today's ever-evolving threat landscape. Learn how to leverage the KEV catalog to enhance your organization's cybersecurity posture and make informed decisions about vulnerability management. Speaker Glenn Thorpe shares valuable expertise to help you navigate the complex world of vulnerability intelligence and stay ahead of potential threats.

Syllabus

Ground Floor, Wed, Aug 7, 16:30 - Wed, Aug 7, CDT


Taught by

BSidesLV

Related Courses

Technology Systems Auditing (Part 1 of 2)
Udemy
Certified in Information System Audit (CISA) - (Updated 2024
Udemy
Become a Certified Information Systems Auditor (CISA)
LinkedIn Learning
CISA Cert Prep: 1 Auditing Information Systems for IS Auditors
LinkedIn Learning
CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors
LinkedIn Learning