SlideShare a Scribd company logo
Risk Analytics for Cyber Security
Liran Chen

Technical Director
Risk Control’s Differentiators: Discovery

Discovery

Analysis

Remediation

Scanless:

Vulnerability Detector
 Scanless vulnerability assessment, finds vulnerabilities
from existing repositories without a scan

Advantages:

■

© 2013 Skybox Security Inc.

Automatically and accurately deduces vulnerabilities
 Provides faster scan cycles (hours or even minutes)
 Delivers continuous, up-to-date discovery
 Covers all nodes including difficult-to-scan systems,
e.g. critical systems, mobile devices, cloud assets

2
Ask Yourself…
How Well is our VM Program Working?
Discovery

Analysis and
Prioritization

How often is vulnerability data collected?
How much of the network is covered?
Is scanning disruptive to the business?
Does the VM approach consider the
network and security controls context?

Are we prioritizing by exploitation risk?
Remediation

How fast are critical vulnerabilities fixed?
Do we consider alternatives to patching?
Is risk level going up or down over time?

© 2013 Skybox Security Inc.

3
Vulnerability Discovery
Augment Active Scans with Daily Updates
Active Scanner

Skybox
Vulnerability Detector
Skybox
Vulnerability
Dictionary

Asset
Database
Threat
Intel

Patch
Database

Product Catalog (CPE)
Rule-based Profiling

Consolidated Vulnerability List (CVE)
Updated Daily
© 2013 Skybox Security Inc.

7
With or Without a 3rd Party Scanner

Continuous View of Vulnerabilities
Combining 3rd party and Skybox Vulnerability Detector
data gives constant vulnerability knowledge
100%
Skybox
Vulnerability
Detector
Q

50%

3rd party
scanner

Month 1
© 2013 Skybox Security Inc.

Time

Month 2
8

Month 3
Vulnerability Dictionary
 Most comprehensive vulnerability
data source

 41,000 vulnerabilities on 1,000
products

 Vulnerability Research Team
consolidates info from 20+
sources. Latest advisories,
scanners, IPS, others

 Additional data analysis, modeling,
info added for use by Skybox
analytics engine

 CVE compliant, CVSS v2
standard, cross-referenced

 Also contains vulnerabilities not
found in CVE list
© 2013 Skybox Security Inc.

9
Vulnerability information sources
 The Vulnerability Dictionary aggregates data from these
sources:

© 2013 Skybox Security Inc.

10
Vulnerability Detector supported platforms
Operating
Systems

© 2013 Skybox Security Inc.

Network Devices

Enterprise service
Applications

11

Client side
Applications
Summary
 Augment your scanner with Risk Control to get better
discovery – analysis and remediation reporting.

 Discover vulnerabilities across your entire enterprise –
especially in places you currently don’t scan

 Discover vulnerabilities within days of announcement,
not weeks or months

© 2013 Skybox Security Inc.

13

More Related Content

PDF
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
PPTX
Securing Your Public Cloud Infrastructure
PPTX
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
PDF
Web App Attacks - Stats & Remediation
PDF
Security Implications of the Cloud - CSS ATX 2017
PPTX
Modernize your Security Operations with Azure Sentinel
PDF
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
PPTX
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Securing Your Public Cloud Infrastructure
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Web App Attacks - Stats & Remediation
Security Implications of the Cloud - CSS ATX 2017
Modernize your Security Operations with Azure Sentinel
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...

What's hot (20)

PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PPTX
The State of Open Source Vulnerabilities - A WhiteSource Webinar
PPTX
Vulnerability Intelligence and Assessment with vulners.com
PPTX
Cloud Security Demo
PDF
Qualys Corporate Brochure
PPTX
Using m365 defender to protect against solorigate
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPTX
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
PDF
Managing third party libraries
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PPTX
Azure Sentinel
PPTX
CYBER THREAT ASSESSMENT
PDF
ARES Next-Gen Risk Management Platform
PPTX
Metaploit
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
PPTX
VMRay intro video
PPTX
Azure Sentinel Jan 2021 overview deck
PPTX
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
The State of Open Source Vulnerabilities - A WhiteSource Webinar
Vulnerability Intelligence and Assessment with vulners.com
Cloud Security Demo
Qualys Corporate Brochure
Using m365 defender to protect against solorigate
Automating Critical Security Controls for Threat Remediation and Compliance
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
Managing third party libraries
Automating Open Source Security: A SANS Review of WhiteSource
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
Azure Sentinel
CYBER THREAT ASSESSMENT
ARES Next-Gen Risk Management Platform
Metaploit
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
VMRay intro video
Azure Sentinel Jan 2021 overview deck
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
Ad

Viewers also liked (12)

PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Sample penetration testing agreement for core infrastructure
PDF
Enterprise Vulnerability Management - ZeroNights16
PDF
How to identify reshipping scams with Neo4j
PDF
Security Attacks on RSA
PPTX
Survey: Security Analytics and Intelligence
PDF
Cyber security and attack analysis : how Cisco uses graph analytics
PPTX
RSA algorithm
PPT
Info Security - Vulnerability Assessment
DOC
Rsa Algorithm
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PDF
RSA ALGORITHM
Big Data Analytics for Cyber Security: A Quick Overview
Sample penetration testing agreement for core infrastructure
Enterprise Vulnerability Management - ZeroNights16
How to identify reshipping scams with Neo4j
Security Attacks on RSA
Survey: Security Analytics and Intelligence
Cyber security and attack analysis : how Cisco uses graph analytics
RSA algorithm
Info Security - Vulnerability Assessment
Rsa Algorithm
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
RSA ALGORITHM
Ad

Similar to RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network (20)

PDF
IKare Vulnerability Scanner - Datasheet EN
PDF
Is Your Vulnerability Management Program Keeping Pace With Risks?
PPTX
Introduction Vulnerability assessment and penetration testing.pptx
PDF
Benchmarking our Network Vulnerability Scanner
PDF
Swascan
PDF
Brochure Swascan Overview
PDF
Telecom Network Incident Investigation Services - SecurityGen
PDF
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
PDF
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
PDF
Secure Horizons: Navigating the Future with Network Security Solutions
PDF
Vulnerability Management System
PPTX
Cyber Security protection by MultiPoint Ltd.
PPTX
Enterprise Class Vulnerability Management Like A Boss
PPT
Security Overview - Updates and Trends In Detail
PDF
Types of Vulnerability Scanning An in depth investigation.pdf
DOCX
user centric machine learning framework for cyber security operations center
PPTX
FALCON.pptx
PPTX
What's Wrong with Vulnerability Management & How Can We Fix It
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
PPTX
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IKare Vulnerability Scanner - Datasheet EN
Is Your Vulnerability Management Program Keeping Pace With Risks?
Introduction Vulnerability assessment and penetration testing.pptx
Benchmarking our Network Vulnerability Scanner
Swascan
Brochure Swascan Overview
Telecom Network Incident Investigation Services - SecurityGen
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
Secure Horizons: Navigating the Future with Network Security Solutions
Vulnerability Management System
Cyber Security protection by MultiPoint Ltd.
Enterprise Class Vulnerability Management Like A Boss
Security Overview - Updates and Trends In Detail
Types of Vulnerability Scanning An in depth investigation.pdf
user centric machine learning framework for cyber security operations center
FALCON.pptx
What's Wrong with Vulnerability Management & How Can We Fix It
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Detect and Respond to Threats Better with IBM Security App Exchange Partners

More from Skybox Security (20)

PPTX
Network Security Trends for 2016: Taking Security to the Next Level
PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
PPTX
5 Steps to Reduce Your Window of Vulnerability
PPTX
Network Security Best Practices - Reducing Your Attack Surface
PPTX
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
PPTX
Secure Data GI - Delivering Contextual Intelligence
PPTX
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
PPTX
Risk Analytics: One Intelligent View
PDF
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
PDF
Infosec 2014: Who Is Skybox Security?
PDF
Infosec 2014: Tech Talk - Firewall Change Management
PDF
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
PDF
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
PDF
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
PDF
RSA 2014: Firewall Change Management: Automate, Secure & Comply
PDF
RSA 2014: Skybox Security Risk Analytics Overview
PDF
Best Practices for Network Security Management
PDF
Infographic: Are You Keeping Pace with Security Risks?
PDF
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
PDF
Security at the Breaking Point: Rethink Security in 2013
Network Security Trends for 2016: Taking Security to the Next Level
Using a Network Model to Address SANS Critical Controls 10 and 11
5 Steps to Reduce Your Window of Vulnerability
Network Security Best Practices - Reducing Your Attack Surface
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
Secure Data GI - Delivering Contextual Intelligence
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
Risk Analytics: One Intelligent View
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Infosec 2014: Who Is Skybox Security?
Infosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Skybox Security Risk Analytics Overview
Best Practices for Network Security Management
Infographic: Are You Keeping Pace with Security Risks?
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Security at the Breaking Point: Rethink Security in 2013

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Tartificialntelligence_presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Machine Learning_overview_presentation.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation theory and applications.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
August Patch Tuesday
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Programs and apps: productivity, graphics, security and other tools
Tartificialntelligence_presentation.pptx
Spectral efficient network and resource selection model in 5G networks
cloud_computing_Infrastucture_as_cloud_p
Machine Learning_overview_presentation.pptx
A comparative study of natural language inference in Swahili using monolingua...
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Univ-Connecticut-ChatGPT-Presentaion.pdf
TLE Review Electricity (Electricity).pptx
Spectroscopy.pptx food analysis technology
Encapsulation theory and applications.pdf
A Presentation on Artificial Intelligence
August Patch Tuesday

RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network

  • 1. Risk Analytics for Cyber Security Liran Chen Technical Director
  • 2. Risk Control’s Differentiators: Discovery Discovery Analysis Remediation Scanless: Vulnerability Detector  Scanless vulnerability assessment, finds vulnerabilities from existing repositories without a scan Advantages: ■ © 2013 Skybox Security Inc. Automatically and accurately deduces vulnerabilities  Provides faster scan cycles (hours or even minutes)  Delivers continuous, up-to-date discovery  Covers all nodes including difficult-to-scan systems, e.g. critical systems, mobile devices, cloud assets 2
  • 3. Ask Yourself… How Well is our VM Program Working? Discovery Analysis and Prioritization How often is vulnerability data collected? How much of the network is covered? Is scanning disruptive to the business? Does the VM approach consider the network and security controls context? Are we prioritizing by exploitation risk? Remediation How fast are critical vulnerabilities fixed? Do we consider alternatives to patching? Is risk level going up or down over time? © 2013 Skybox Security Inc. 3
  • 4. Vulnerability Discovery Augment Active Scans with Daily Updates Active Scanner Skybox Vulnerability Detector Skybox Vulnerability Dictionary Asset Database Threat Intel Patch Database Product Catalog (CPE) Rule-based Profiling Consolidated Vulnerability List (CVE) Updated Daily © 2013 Skybox Security Inc. 7
  • 5. With or Without a 3rd Party Scanner Continuous View of Vulnerabilities Combining 3rd party and Skybox Vulnerability Detector data gives constant vulnerability knowledge 100% Skybox Vulnerability Detector Q 50% 3rd party scanner Month 1 © 2013 Skybox Security Inc. Time Month 2 8 Month 3
  • 6. Vulnerability Dictionary  Most comprehensive vulnerability data source  41,000 vulnerabilities on 1,000 products  Vulnerability Research Team consolidates info from 20+ sources. Latest advisories, scanners, IPS, others  Additional data analysis, modeling, info added for use by Skybox analytics engine  CVE compliant, CVSS v2 standard, cross-referenced  Also contains vulnerabilities not found in CVE list © 2013 Skybox Security Inc. 9
  • 7. Vulnerability information sources  The Vulnerability Dictionary aggregates data from these sources: © 2013 Skybox Security Inc. 10
  • 8. Vulnerability Detector supported platforms Operating Systems © 2013 Skybox Security Inc. Network Devices Enterprise service Applications 11 Client side Applications
  • 9. Summary  Augment your scanner with Risk Control to get better discovery – analysis and remediation reporting.  Discover vulnerabilities across your entire enterprise – especially in places you currently don’t scan  Discover vulnerabilities within days of announcement, not weeks or months © 2013 Skybox Security Inc. 13