SlideShare a Scribd company logo
Presented by
Subrat Kumar Dash
Let’s plan here
The Last Mile
Problem
Most organizations
are good at figuring
out what to fix,
but also knowing
how to fix is
important too.
Gartner
(Risked Based
Approach)
Don’t patch everything
Patch which are already
weaponized
Type of exploited
Actively in used and talked
about (In Wild/In Dark)
Used by ransomware
Uday Sharma
30-45 Years old living in Tier 1/Tier 2
Cities
Job Title: Security Consultant
Education: Bachelors/MTech
Income: 20L-30L Per Annum
I want to make my company secure.
Motivation
Frustration
• Want Dashboard to monitor everything in one place and easy extract to
share the report to stakeholder.
• Want to find the right threat before bad guys do.
• Want to keep updated myself on latest information and trend on threat.
• I don’t have any resource to support me.
• I am more concerned about my company get attacked.
• I might miss to flag something will put my company at risk.
• Getting job done/ Convincing people is critical task for me.
Uday comes from a middle-class family. He is tech-savvy and cares
about aesthetics and looks. I wear lot of hats, but majority of my time
spent monitoring and flagging risk, prioritize the risk and working
with respective Reliability/IT Dev team to mitigate the risk.
Shakti Goyal
28-35 Years old living in Tier 1/Tier 2
Cities
Job Title: Senior System
Engineer/Reliability Team
Education: Bachelors
Income: 20L-30L Per Annum
I want to deliver my sprint goal in deadline as well as
I want to solve the incident in SLA.
Motivation
Frustration
• want to have better communication between stakeholders, so I can
deliver something they really need and use.
• want to be the expert on some part of the system.
• want to learn new tools and skills.
• When requirements change on a project once it's already begun.
• When work is inaccurately scoped, it causes stress and eats into
time planned for other work.
• When security team require urgent patch in short notice.
• Managing vulnerability is tough without any solution.
Shakti comes from a middle-class family. He is tech-savvy. I spend
most of my time focused on completing planned development
tasks, planning for the next sprint, and fixing bugs or customer
requests as they arise. I work off of JIRA tickets.
Patching
• 4 out of 10 data breaches
reportedly occur because a patch
was available but not applied.
• On average it takes 12 days for
teams to coordinate for applying
a patch across all devices.
• The average time for
organizations to close a
discovered vulnerability (caused
by unpatched software and apps)
is 67 days
Start
Asset Validation Is Asset Impacted
No
Action
Needed
No
Validate Asset
Disposition
Is server in
DECOM Status?
Call Decom
Process
Is Server Decom?
Document/Close
and Validate
Prevention
Yes
Yes
Yes
No
CMDB
Is mitigation in
available?
Validate in
Non-Prod
Is non-prod
Impacted
Apply Patch
Is it implemented
Successfully?
Discuss
Alternative
Is Solution
Available
Move to
Prod
Is it
implemented
Successfully?
Rescan
process
Is it vulnerability
remediated?
Discuss
Alternative
N
Y
N
Y
N
Y Y
N
Is there a solution
available
Risk
Acceptance
Is Risk Accepted
Escalation and
Priortize
N
N
N
Y
Y
N
Call Risk
Acceptance
and Action
Patch
Rebuild
Upgrade
Disable Config
DIT
SIT
UAT
PREF
Check if issue
can be
prevented in
future
Current
Patching
Problem
• Time wasted chasing and
remediating false positives.
• No tolerance for the downtime
required for patching
• Manual processes, including
emails and spreadsheets, that
let problems slip through the
cracks.
• Lack of coordination between
the security and IT teams
• Not enough resources to keep
up with the volume of patches
Check for
patch
Download
Patch
Test
Patches
Install
Patched
Validate
Fix
Update
CMDB
Automated
Partially
Automated
Competitive Analysis
Attribute Rapid7 Tenable
Segment Enterprise Mid-Market
Pricing Per Asset Yearly
UI/UX Good Medium
Customer Support Experience Low Medium
Ease of Use Easy Easy
Patch Management Exist No
Dashboard (Filter/Queries) Medium Good
False Positive Medium Low
Priortization Model 4 Model Predictive
Game changer Tool perspective
• Combination of risk-based
vulnerability prioritization and
automated patch intelligence.
• Make patch recommendation with
reliability score and current trend
on patch.
Game changer
Strategy perspective
• Integrating vulnerability efforts
and putting in development team
product backlog makes more
focus.
• Balance between security and
growth (Security Vulnerability are
technical debt are hidden debt for
technical organization).
• Tracking of current patch lifecycle
and risk acceptance will benefit
organization and updating KB.
Thank you

More Related Content

PDF
BEST CYBER SECURITY PRACTICES
PDF
18 Ways Incident Management Systems Create Order (And Why It Matters)
PPT
Technical Escalations Best Practices
PPTX
Andrew Vermes: Major Incident Management
PDF
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
PPTX
Getting Started with Business Continuity
PDF
Future Proof Your DAM
PPT
Advice On IT Implementations
BEST CYBER SECURITY PRACTICES
18 Ways Incident Management Systems Create Order (And Why It Matters)
Technical Escalations Best Practices
Andrew Vermes: Major Incident Management
ITIL Service Management: Integrating Normal Incident, Major Incident & Servic...
Getting Started with Business Continuity
Future Proof Your DAM
Advice On IT Implementations

What's hot (20)

PPTX
The service desk as a strategic function
PDF
ITIL Incident Management Workflow PowerPoint Presentation Slides
PDF
Incident Management Best Practices
PPT
Incident Management
PDF
Major Incident - make your NOC Rock
PPTX
Incident and Problem management simplified
PDF
Credit Union Cyber Security
PDF
How to Build an Invincible Incident Management Plan
PDF
Major Incident Management
PPTX
Technology Risk Management
PDF
ITIL Incident Management Workflow - Process Guide
PPTX
Practical Guidelines to Implementing a Talent Management System
PDF
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
PDF
Effective Business Continuity Plan Powerpoint Presentation Slides
PDF
Business continuity plan
DOC
CMGT 430 V3 Start With a Dream /newtonhelp.com
DOC
CMGT 430 V3 Life of the Mind/newtonhelp.com   
PPTX
ITIL Incident management
PDF
Reengineered virtual infrastructure for a leading private equity enterprise.
PDF
Three Critical Mistakes Companies Make with Employee Experience Software | So...
The service desk as a strategic function
ITIL Incident Management Workflow PowerPoint Presentation Slides
Incident Management Best Practices
Incident Management
Major Incident - make your NOC Rock
Incident and Problem management simplified
Credit Union Cyber Security
How to Build an Invincible Incident Management Plan
Major Incident Management
Technology Risk Management
ITIL Incident Management Workflow - Process Guide
Practical Guidelines to Implementing a Talent Management System
10 Critical Aspects of IT Service Continuity to Protect Your Company's Digita...
Effective Business Continuity Plan Powerpoint Presentation Slides
Business continuity plan
CMGT 430 V3 Start With a Dream /newtonhelp.com
CMGT 430 V3 Life of the Mind/newtonhelp.com   
ITIL Incident management
Reengineered virtual infrastructure for a leading private equity enterprise.
Three Critical Mistakes Companies Make with Employee Experience Software | So...
Ad

Similar to Service now vulnerability patching_move (20)

PPTX
Risk monitoring and response
PPTX
Managing a Crisis, Women in Tech Summit Philly, 2017
PPTX
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
PPT
Leveraging Diversity to Find What Works and Amplify
PDF
Expert in Software Development, IT Infrastructure, and Computer Engineering
PDF
Medici Technologies common problems with data analysis
PDF
Questions On Technical Design Decisions
PDF
Careers in System Administration (2007)
PPTX
5_Why_Root_Cause_Corrective_Actions.pptx
PDF
5 Steps to Improve Your Incident Response Plan
PPT
PDF
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
PPTX
PDF
Endpoint Security & Why It Matters!
PDF
Information Security Awareness
DOC
Vicky Saluja Resume IBM INDIA
DOCX
Project Manager
PPTX
Successful DevSecOps Organizations - by Dawid Balut
PPTX
Understanding the security_organization
PPTX
Right size enterprise disaster recovery plans
Risk monitoring and response
Managing a Crisis, Women in Tech Summit Philly, 2017
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
Leveraging Diversity to Find What Works and Amplify
Expert in Software Development, IT Infrastructure, and Computer Engineering
Medici Technologies common problems with data analysis
Questions On Technical Design Decisions
Careers in System Administration (2007)
5_Why_Root_Cause_Corrective_Actions.pptx
5 Steps to Improve Your Incident Response Plan
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Endpoint Security & Why It Matters!
Information Security Awareness
Vicky Saluja Resume IBM INDIA
Project Manager
Successful DevSecOps Organizations - by Dawid Balut
Understanding the security_organization
Right size enterprise disaster recovery plans
Ad

More from Subrat Kumar Dash (20)

PDF
Atlan to Airflow integration.pdf
PDF
Clear_Partner Management System_Case Challange_Subrat.pdf
PDF
Atlan_Product metering_Subrat.pdf
PDF
Case study-Strategic Evaluation for Launching SMS Channel on Mailchimp.pdf
PDF
MPL_Pre-Owned game Console_Challange.pdf
PDF
Solving through Systems Thinking.pdf
PPTX
NGO Pravasi Sathi_Paper Based Survey to Digital.pptx
PDF
Duplicate Listing in Property Portal
PDF
Mpokket EMI Feature
PDF
Porter Challenge.pdf
PDF
Personalised Learning for Edtech.pdf
PDF
Improve Operational Efficiency.pdf
PDF
Edge_Strategy_Opentext_Supplier_Risk_Management.pdf
PDF
Garden_PM_Casestudy.pdf
PDF
MoneyView_Loyalty Program.pdf
PDF
Product Design for Inventory Not Found.pdf
PDF
Staying ahead of industry changes.pdf
PDF
Insurance claim management
PDF
Increase Stock edge User Engagement
PDF
Tesla case study
Atlan to Airflow integration.pdf
Clear_Partner Management System_Case Challange_Subrat.pdf
Atlan_Product metering_Subrat.pdf
Case study-Strategic Evaluation for Launching SMS Channel on Mailchimp.pdf
MPL_Pre-Owned game Console_Challange.pdf
Solving through Systems Thinking.pdf
NGO Pravasi Sathi_Paper Based Survey to Digital.pptx
Duplicate Listing in Property Portal
Mpokket EMI Feature
Porter Challenge.pdf
Personalised Learning for Edtech.pdf
Improve Operational Efficiency.pdf
Edge_Strategy_Opentext_Supplier_Risk_Management.pdf
Garden_PM_Casestudy.pdf
MoneyView_Loyalty Program.pdf
Product Design for Inventory Not Found.pdf
Staying ahead of industry changes.pdf
Insurance claim management
Increase Stock edge User Engagement
Tesla case study

Recently uploaded (20)

PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
A Brief Introduction About Julia Allison
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Chapter 5_Foreign Exchange Market in .pdf
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPTX
5 Stages of group development guide.pptx
PDF
IFRS Notes in your pocket for study all the time
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Types of control:Qualitative vs Quantitative
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Lecture (1)-Introduction.pptx business communication
Ôn tập tiếng anh trong kinh doanh nâng cao
DOC-20250806-WA0002._20250806_112011_0000.pdf
A Brief Introduction About Julia Allison
Power and position in leadershipDOC-20250808-WA0011..pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Chapter 5_Foreign Exchange Market in .pdf
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
WRN_Investor_Presentation_August 2025.pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
5 Stages of group development guide.pptx
IFRS Notes in your pocket for study all the time
340036916-American-Literature-Literary-Period-Overview.ppt
Types of control:Qualitative vs Quantitative
COST SHEET- Tender and Quotation unit 2.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Lecture (1)-Introduction.pptx business communication

Service now vulnerability patching_move

  • 3. The Last Mile Problem Most organizations are good at figuring out what to fix, but also knowing how to fix is important too.
  • 4. Gartner (Risked Based Approach) Don’t patch everything Patch which are already weaponized Type of exploited Actively in used and talked about (In Wild/In Dark) Used by ransomware
  • 5. Uday Sharma 30-45 Years old living in Tier 1/Tier 2 Cities Job Title: Security Consultant Education: Bachelors/MTech Income: 20L-30L Per Annum I want to make my company secure. Motivation Frustration • Want Dashboard to monitor everything in one place and easy extract to share the report to stakeholder. • Want to find the right threat before bad guys do. • Want to keep updated myself on latest information and trend on threat. • I don’t have any resource to support me. • I am more concerned about my company get attacked. • I might miss to flag something will put my company at risk. • Getting job done/ Convincing people is critical task for me. Uday comes from a middle-class family. He is tech-savvy and cares about aesthetics and looks. I wear lot of hats, but majority of my time spent monitoring and flagging risk, prioritize the risk and working with respective Reliability/IT Dev team to mitigate the risk.
  • 6. Shakti Goyal 28-35 Years old living in Tier 1/Tier 2 Cities Job Title: Senior System Engineer/Reliability Team Education: Bachelors Income: 20L-30L Per Annum I want to deliver my sprint goal in deadline as well as I want to solve the incident in SLA. Motivation Frustration • want to have better communication between stakeholders, so I can deliver something they really need and use. • want to be the expert on some part of the system. • want to learn new tools and skills. • When requirements change on a project once it's already begun. • When work is inaccurately scoped, it causes stress and eats into time planned for other work. • When security team require urgent patch in short notice. • Managing vulnerability is tough without any solution. Shakti comes from a middle-class family. He is tech-savvy. I spend most of my time focused on completing planned development tasks, planning for the next sprint, and fixing bugs or customer requests as they arise. I work off of JIRA tickets.
  • 7. Patching • 4 out of 10 data breaches reportedly occur because a patch was available but not applied. • On average it takes 12 days for teams to coordinate for applying a patch across all devices. • The average time for organizations to close a discovered vulnerability (caused by unpatched software and apps) is 67 days
  • 8. Start Asset Validation Is Asset Impacted No Action Needed No Validate Asset Disposition Is server in DECOM Status? Call Decom Process Is Server Decom? Document/Close and Validate Prevention Yes Yes Yes No CMDB Is mitigation in available? Validate in Non-Prod Is non-prod Impacted Apply Patch Is it implemented Successfully? Discuss Alternative Is Solution Available Move to Prod Is it implemented Successfully? Rescan process Is it vulnerability remediated? Discuss Alternative N Y N Y N Y Y N Is there a solution available Risk Acceptance Is Risk Accepted Escalation and Priortize N N N Y Y N Call Risk Acceptance and Action Patch Rebuild Upgrade Disable Config DIT SIT UAT PREF Check if issue can be prevented in future
  • 9. Current Patching Problem • Time wasted chasing and remediating false positives. • No tolerance for the downtime required for patching • Manual processes, including emails and spreadsheets, that let problems slip through the cracks. • Lack of coordination between the security and IT teams • Not enough resources to keep up with the volume of patches
  • 11. Competitive Analysis Attribute Rapid7 Tenable Segment Enterprise Mid-Market Pricing Per Asset Yearly UI/UX Good Medium Customer Support Experience Low Medium Ease of Use Easy Easy Patch Management Exist No Dashboard (Filter/Queries) Medium Good False Positive Medium Low Priortization Model 4 Model Predictive
  • 12. Game changer Tool perspective • Combination of risk-based vulnerability prioritization and automated patch intelligence. • Make patch recommendation with reliability score and current trend on patch.
  • 13. Game changer Strategy perspective • Integrating vulnerability efforts and putting in development team product backlog makes more focus. • Balance between security and growth (Security Vulnerability are technical debt are hidden debt for technical organization). • Tracking of current patch lifecycle and risk acceptance will benefit organization and updating KB.