Who Watches the Watchers - Metrics for Security Strategy
Offered By: YouTube
Course Description
Overview
Explore a comprehensive conference talk on security metrics and strategy, delving into the importance of metrics in cybersecurity. Learn about automation, vulnerabilities, and the power law distribution in security. Discover vulnerability management techniques and understand what makes a metric effective or ineffective. Examine the concept of successful exploits and how to prioritize using the Common Vulnerability Scoring System (CVSS). Investigate exploitability metrics and various types of metrics used in security. Analyze the mean time to incident discovery and its limitations. Gain insights into scanning coverage and explore the most interesting metrics in the field of cybersecurity.
Syllabus
Intro
Metrics are useful
Automation
Vulnerabilities
Powerlaw
Vulnerability Management
What makes a metric bad
What is a successful exploit
CBSS for prioritization
CBSS for breach volume
Exploitability metrics
What defines a good metric
Types of metrics
Good metrics
Mean time to incident discovery
The problem with using the metric
Scanning coverage
Most interesting metrics
Related Courses
The Foundations of CybersecurityUniversity System of Georgia via Coursera Introduction to Cybersecurity
SecurityScoreCard via Udacity TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy Fundamentals of Internet Security | Secure Your Environment
Udemy Ciberseguridad en linea
Udemy