SlideShare a Scribd company logo
SESSION ID:
#RSAC
Josh Zelonis
EVOLVE OR DIE: HOW TO STOP
GETTING SLAUGHTERED DUE TO BAD
VULNERABILITY MANAGEMENT
TECH-W02
Senior Analyst
Forrester
@jz415
# R S A C
We are in a constant
state of failure.
# R S A C
Vulnerability Management Process
Asset
Identification
Enumeration
Prioritization
Remediation
# R S A C
Vulnerability Management Process
Asset
Identification
Enumeration
Prioritization
Remediation
#RSAC
VULNERABILITY MANAGEMENT IS A
MAINTENANCE TASK THAT BEGINS AND
ENDS WITH OPERATIONS
# R S A C
The Heisenberg Uncertainty Principle
of Asset Management
# R S A C
Take Charge Of Asset Management
Queryable infrastructure is the fabric of a good CMDB
Consider the operational benefits of EDR products
Remote management software
Creates queryable infrastructure
Ability to detect misuse
Use scanners to identify unmanaged hosts
Embrace coverage as a critical metric
#RSAC
IN 2017, OVER 29% OF CVE HAD A
SEVERITY OF HIGH OR CRITICAL.
# R S A C
Define SLA’s By Priority, Not Severity
9
Asset Criticality
Vulnerability Severity
High
Medium
Low
Low
Priority 3
Priority 4
Priority 5
Medium
Priority 2
Priority 3
Priority 4
High
Priority 1
Priority 2
Priority 3
Critical
Priority 1
Priority 2
Priority 3
# R S A C
It’s Time To Start Using Threat Intelligence Strategically
#RSAC
KEY QUESTION: HOW COULD AN
ATTACKER EXPLOIT THIS VULNERABILITY?
# R S A C
Dissect Delivery and Exploitation
A Cursory Analysis of Meltdown
Can be delivered to browser using JavaScript
—Endpoint threat model similar to Adobe Flash
How do you execute this code on a server?
—Other RCE vulnerability in an exposed service
—Privilege escalation if already local
# R S A C
Understand How You’ll Be Attacked
0
50
100
150
200
References
Vulnerability
# R S A C
How To Talk To Executives About
Vulnerability Management
# R S A C
Counting Stats Don’t Make Good Metrics
# R S A C
Control the Message
16
Help execs understand what they need to know to protect their jobs
Generate and present metrics that are consumable
This provides clarity into what you’re doing to protect them
Helps measure progress over time
GOAL: Help them make business decisions based on this information
# R S A C
Let’s Review!
Vulnerability management is a business process.
Queryable infrastructure is the fabric of good asset management.
Perform prioritization based on threat intel andasset criticality.
Help executives make business decisions supported by metrics about
unmitigated risk.
# R S A C
Apply What You Have Learned Today
Change your ideology, become a participant!
Identify and start tracking key metrics now, to help show trends later.
Critical Metric! Coverage, coverage, coverage!
Look for intelligence sources which inform threat/exploitation details.
Embrace an “application stack” approach to asset management.
Understand how software is developed and deployed within your organization.
# R S A C
Apply What You Have Learned In 3 Months
Begin outreach and develop relationships!
Start providing relevant intelligence briefings to executives.
Communicate priority based on how an exploit could be delivered.
New Metric! How are you reducing work by deprioritizing CVSS severity?
Champion efforts with operations to improve asset management.
“How can we help?” – But with suggestions, resources, and budget.
# R S A C
Apply What You Have Learned In 6 Months
Become part of the operations process!
Start leveraging CI/CD processes for patch deployment.
Key Metric! You are committing code, use build metrics to track issues.
Leverage queryable infrastructure for real time asset inventory.
Codify a new vulnerability remediation SLA based on internal priority.
#RSAC
THANK YOU!
Email: jzelonis@forrester.com
LinkedIn: https://www.linkedin.com/in/zelonis/
Twitter: @jz415

More Related Content

PDF
Medical Device Threat Modeling with Templates
PDF
Evidence-Based Security: The New Top Five Controls
PDF
Make IR Effective with Risk Evaluation and Reporting
PDF
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
PDF
Agile Security—Field of Dreams
PDF
The Rise of the Purple Team
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Medical Device Threat Modeling with Templates
Evidence-Based Security: The New Top Five Controls
Make IR Effective with Risk Evaluation and Reporting
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Agile Security—Field of Dreams
The Rise of the Purple Team
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration

What's hot (19)

PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
PDF
Pulling our-socs-up
PDF
Cylance Protect-Next-Generation Antivirus-Overview
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
Embracing Threat Intelligence and Finding ROI in Your Decision
PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PPTX
Exploring the Capabilities and Economics of Cybercrime
PDF
Cylance Information Security: Compromise Assessment Datasheet
PDF
Preserving the Privilege during Breach Response
PDF
Soc 2030-socs-are-broken-lets-fix- them
PDF
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
DON'T Use Two-Factor Authentication...Unless You Need It!
PPTX
Debunking the Hacker Hype: The Reality of Widespread Blackouts
PDF
Insights from-NSAs-cybersecurity-threat-operations-center
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Pulling our-socs-up
Cylance Protect-Next-Generation Antivirus-Overview
Building a Next-Generation Security Operations Center (SOC)
Embracing Threat Intelligence and Finding ROI in Your Decision
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Exploring the Capabilities and Economics of Cybercrime
Cylance Information Security: Compromise Assessment Datasheet
Preserving the Privilege during Breach Response
Soc 2030-socs-are-broken-lets-fix- them
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
DATA LOSS PREVENTION OVERVIEW
DON'T Use Two-Factor Authentication...Unless You Need It!
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Insights from-NSAs-cybersecurity-threat-operations-center
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Hands on Security, Disrupting the Kill Chain, SplunkLive! Austin
Ad

Similar to Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Management (20)

PDF
Creating Order from Chaos: Metrics That Matter
PDF
Understanding the “Why” in Enterprise Application Security Strategy
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
PDF
Rapid Threat Modeling Techniques
PDF
Top 5 secrets to successfully jumpstarting your cyber-risk program
PPTX
Settle the Score
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
PPTX
How to Build and Validate Ransomware Attack Detections (Secure360)
PDF
Weakest links of an organization's Cybersecurity chain
PDF
Cyber presentation spet 2019 v8sentfor upload
PDF
Securing 100 products - How hard can it be?
PDF
w-cyber-risk-modeling Owasp cyber risk quantification 2018
PDF
…But Now I See—A Vulnerability Disclosure Maturity Model
PDF
Cyber Defense Matrix Workshop - RSA Conference
PPTX
NIST Critical Security Framework (CSF)
PDF
Briefing the board lessons learned from cisos and directors
PPTX
Web Application Security Vulnerability Management Framework
PDF
There’s No Such Thing as a Cyber-Risk
PPTX
Enterprise Class Vulnerability Management Like A Boss
PDF
Developing useful metrics
Creating Order from Chaos: Metrics That Matter
Understanding the “Why” in Enterprise Application Security Strategy
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Rapid Threat Modeling Techniques
Top 5 secrets to successfully jumpstarting your cyber-risk program
Settle the Score
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Build and Validate Ransomware Attack Detections (Secure360)
Weakest links of an organization's Cybersecurity chain
Cyber presentation spet 2019 v8sentfor upload
Securing 100 products - How hard can it be?
w-cyber-risk-modeling Owasp cyber risk quantification 2018
…But Now I See—A Vulnerability Disclosure Maturity Model
Cyber Defense Matrix Workshop - RSA Conference
NIST Critical Security Framework (CSF)
Briefing the board lessons learned from cisos and directors
Web Application Security Vulnerability Management Framework
There’s No Such Thing as a Cyber-Risk
Enterprise Class Vulnerability Management Like A Boss
Developing useful metrics
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
PDF
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Machine Learning_overview_presentation.pptx
PPT
Teaching material agriculture food technology
SOPHOS-XG Firewall Administrator PPT.pptx
1. Introduction to Computer Programming.pptx
Getting Started with Data Integration: FME Form 101
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Tartificialntelligence_presentation.pptx
Machine Learning_overview_presentation.pptx
Teaching material agriculture food technology

Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Management

  • 1. SESSION ID: #RSAC Josh Zelonis EVOLVE OR DIE: HOW TO STOP GETTING SLAUGHTERED DUE TO BAD VULNERABILITY MANAGEMENT TECH-W02 Senior Analyst Forrester @jz415
  • 2. # R S A C We are in a constant state of failure.
  • 3. # R S A C Vulnerability Management Process Asset Identification Enumeration Prioritization Remediation
  • 4. # R S A C Vulnerability Management Process Asset Identification Enumeration Prioritization Remediation
  • 5. #RSAC VULNERABILITY MANAGEMENT IS A MAINTENANCE TASK THAT BEGINS AND ENDS WITH OPERATIONS
  • 6. # R S A C The Heisenberg Uncertainty Principle of Asset Management
  • 7. # R S A C Take Charge Of Asset Management Queryable infrastructure is the fabric of a good CMDB Consider the operational benefits of EDR products Remote management software Creates queryable infrastructure Ability to detect misuse Use scanners to identify unmanaged hosts Embrace coverage as a critical metric
  • 8. #RSAC IN 2017, OVER 29% OF CVE HAD A SEVERITY OF HIGH OR CRITICAL.
  • 9. # R S A C Define SLA’s By Priority, Not Severity 9 Asset Criticality Vulnerability Severity High Medium Low Low Priority 3 Priority 4 Priority 5 Medium Priority 2 Priority 3 Priority 4 High Priority 1 Priority 2 Priority 3 Critical Priority 1 Priority 2 Priority 3
  • 10. # R S A C It’s Time To Start Using Threat Intelligence Strategically
  • 11. #RSAC KEY QUESTION: HOW COULD AN ATTACKER EXPLOIT THIS VULNERABILITY?
  • 12. # R S A C Dissect Delivery and Exploitation A Cursory Analysis of Meltdown Can be delivered to browser using JavaScript —Endpoint threat model similar to Adobe Flash How do you execute this code on a server? —Other RCE vulnerability in an exposed service —Privilege escalation if already local
  • 13. # R S A C Understand How You’ll Be Attacked 0 50 100 150 200 References Vulnerability
  • 14. # R S A C How To Talk To Executives About Vulnerability Management
  • 15. # R S A C Counting Stats Don’t Make Good Metrics
  • 16. # R S A C Control the Message 16 Help execs understand what they need to know to protect their jobs Generate and present metrics that are consumable This provides clarity into what you’re doing to protect them Helps measure progress over time GOAL: Help them make business decisions based on this information
  • 17. # R S A C Let’s Review! Vulnerability management is a business process. Queryable infrastructure is the fabric of good asset management. Perform prioritization based on threat intel andasset criticality. Help executives make business decisions supported by metrics about unmitigated risk.
  • 18. # R S A C Apply What You Have Learned Today Change your ideology, become a participant! Identify and start tracking key metrics now, to help show trends later. Critical Metric! Coverage, coverage, coverage! Look for intelligence sources which inform threat/exploitation details. Embrace an “application stack” approach to asset management. Understand how software is developed and deployed within your organization.
  • 19. # R S A C Apply What You Have Learned In 3 Months Begin outreach and develop relationships! Start providing relevant intelligence briefings to executives. Communicate priority based on how an exploit could be delivered. New Metric! How are you reducing work by deprioritizing CVSS severity? Champion efforts with operations to improve asset management. “How can we help?” – But with suggestions, resources, and budget.
  • 20. # R S A C Apply What You Have Learned In 6 Months Become part of the operations process! Start leveraging CI/CD processes for patch deployment. Key Metric! You are committing code, use build metrics to track issues. Leverage queryable infrastructure for real time asset inventory. Codify a new vulnerability remediation SLA based on internal priority.
  • 21. #RSAC THANK YOU! Email: jzelonis@forrester.com LinkedIn: https://www.linkedin.com/in/zelonis/ Twitter: @jz415