Discovering Hidden Vulnerability Intelligence in CISA's KEV Catalog
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the dynamic world of cybersecurity intelligence in this 22-minute conference talk from BSidesLV. Dive into the Known Exploited Vulnerabilities (KEV) catalog, initially developed by the Cybersecurity and Infrastructure Security Agency (CISA) for government use but now widely adopted across industries. Uncover hidden insights within this treasure trove of exploit intelligence and gain a fresh perspective on prioritizing vulnerabilities in today's ever-evolving threat landscape. Learn how to leverage the KEV catalog to enhance your organization's cybersecurity posture and make informed decisions about vulnerability management. Speaker Glenn Thorpe shares valuable expertise to help you navigate the complex world of vulnerability intelligence and stay ahead of potential threats.
Syllabus
Ground Floor, Wed, Aug 7, 16:30 - Wed, Aug 7, CDT
Taught by
BSidesLV
Related Courses
Technology Systems Auditing (Part 1 of 2)Udemy Certified in Information System Audit (CISA) - (Updated 2024
Udemy Become a Certified Information Systems Auditor (CISA)
LinkedIn Learning CISA Cert Prep: 1 Auditing Information Systems for IS Auditors
LinkedIn Learning CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors
LinkedIn Learning