Measuring Vulnerability Remediation Strategies with Real-World Data
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Data-driven cybersecurity research
Core questions for vulnerability remediation
There are A LOT of vulnerabilities
Scope of exposures can be large
On average, firms fix 1 in 10 vulnerabilities
Weaponization happens quickly
Exploitation unfolds gradually
Remediation takes time
Maybe "ALL" vulns isn't the best measure of success
How do we measure "better" or "worse" performance?
Identifying performance factors
Overall VM maturity
Assets under management
VM program budget
VM team structure
Prioritization criteria
CVSS is an objectively poor predictor of exploitation
Remediation deadlines
Process complexity
Patch deployment methods
Summary of performance factors
Strategy makes a huge difference
What do you mean by strategy?
Strategic choices in vulnerability remediation
Exploit prediction improves prioritization
Additional resources for prioritizing vulnerabilities
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube