SlideShare a Scribd company logo
UNDERSTANDING
ASSET RISK
VIA
VULNERABILITY
PRIORITIZATIONUnderstanding Asset Risk Via Vulnerability Prioritization
LAW 1
SECURITY IS
A DATA
PROBLEM
FLAW 1: DATA FUNDAMENTALISM
FLAW 2: STOCHASTIC IGNORANCE
ATTACKERS CHANGE TACTICS DAILY
DATA-DRIVEN
SECURITY
REAL-TIME
TODO 1: CORRELATE AND CLEAN
TODO 2: FIND GROUND TRUTH
1. Breaches
2. Exploits
3. Global Attack
4. Local Attack
5. Zero Days
6. Trends
7. Impact
• Alienvault, Dell, Internal(Snort)
• EDB, MSP, EKITS, Symatec, Internal(Scraper)
• SixScan, ISC, Dell, CarbonBlack, iSight, ThreatStream,
PaloAlto, FireEye, Imperva, Norse
• Snort
• iDefense, ExodusIntel
• Internal, Interal(Attack Velocity), BitSight
• DBIR, NetDiligence, Config (Qualys)
TODO 3: RELATE TYPES OF RISK
“It is a capital mistake to theorize before
one has data.
Insensibly, one begins to twist facts to suit
theories, instead of theories to suit facts.”
I Love It When You Call Me Big Data
150,000,000 Live Vulnerabilities
1,500,000 Assets
2,000 Organizations
I Love It When You Call Me Big Data
200,000,000 BREACHES
Baseline Allthethings
Probability
(You Will Be Breached On A Particular Open Vulnerability)?
=(Open Vulnerabilities | Breaches Occurred On Their CVE)
/(Total Open Vulnerabilities)
6%
Probability A Vuln Having Property X Has Observed Breaches
0 2 4 6 8 10 12
0
1
2
3
4
5
6
7
8
9
10
Breach1Probability1(%)
CVSS1Base
Probability A Vuln Having Property X Has Observed Breaches
0 5 10 15 20 25 30 35 40
CVSS*10
EDB
MSP
EDB+MSP
Breach*Probability*(%)
Not So Secret Sauce
CVSS$Base
Normalize$Base$
Score Metasploit? ExploitDB?
Exploit$Source$
3,4,5,6...N?
Active$Breach$
Velocity
Asset$
Internal/External?
Vulnerability$
Trending?
Zero$Days? Risk$Meter$Score
0
5
10
15
20
25
30
35
40
0 1 2 3 4 5 6 7 8 9 10
Positive2Predictive2Value
Score
Positive2Predictive2Value2as2a2Function2of2Score2Cutoff
CVSS2Base
CVSS2Temporal
Risk2Meter
Understanding Asset Risk Via Vulnerability Prioritization
NORMAL
DISTRIBUTIONS
RULE EVERYTHING
AROUND ME
BREACH SIZE BY RECORDS LOST
P(Breach involves X records) = X^-1.31
BREACH FREQUENCY BY CVE TYPE
P(CVE has breach volume X) = X^-1.5
DEALING WITH
FAT TAILS
ASSET RISK MODEL
Understanding Asset Risk Via Vulnerability Prioritization
Understanding Asset Risk Via Vulnerability Prioritization
APPLES TO APPLES, RISKS TO RISKS
MODEL DATA
ASSET RISK
QUESTIONS:
VULN PRIORITY
QUESTIONS:
How do we model risk?
Does topology matter?
How good is our current
model?
What data do we need
about exploits?
What data do we need
about live vulns?
How good is your asset
inventory?

More Related Content

PPTX
44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...
PDF
SACON - Deception Technology (Sahir Hidayatullah)
PPT
Why Risk Management is Impossible
PPT
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
PPTX
603535ransomware
PDF
Computer & Data Security
PPTX
PPTX
44CON 2013 - Surviving the 0-day - Reducing the Window of Exposure - Andreas ...
SACON - Deception Technology (Sahir Hidayatullah)
Why Risk Management is Impossible
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
603535ransomware
Computer & Data Security

Similar to Understanding Asset Risk Via Vulnerability Prioritization (20)

PDF
Why Risk Management Fails
PDF
Egypt Cloud Day, May2011-- Information Assurance
PDF
Fix What Matters
PDF
The Aftermath: You Have Been Attacked! So what's next?
PDF
Fix What Matters: A Data Driven Approach to Vulnerability Management
PDF
PDF
shilpa
PPTX
APT in the Financial Sector
PDF
Defcon 18-geers-baltic-cyber-shield
PDF
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
Offensive malware usage and defense
PPTX
Do it Best Corp. Techapalooza 2013 Presentation
PDF
Behavior-Based Defense in ICS
PDF
Technologies and Policies for a Defensible Cyberspace
PPTX
Targeted Attacks: Have you found yours?
PDF
Adam Meyers - RCE: Obfuscation and Communications
PDF
Adam Meyers - Obfuscation And Communications
PDF
Resiliency-Part One -11-3-2015
Why Risk Management Fails
Egypt Cloud Day, May2011-- Information Assurance
Fix What Matters
The Aftermath: You Have Been Attacked! So what's next?
Fix What Matters: A Data Driven Approach to Vulnerability Management
shilpa
APT in the Financial Sector
Defcon 18-geers-baltic-cyber-shield
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
[Bucharest] Attack is easy, let's talk defence
Offensive malware usage and defense
Do it Best Corp. Techapalooza 2013 Presentation
Behavior-Based Defense in ICS
Technologies and Policies for a Defensible Cyberspace
Targeted Attacks: Have you found yours?
Adam Meyers - RCE: Obfuscation and Communications
Adam Meyers - Obfuscation And Communications
Resiliency-Part One -11-3-2015
Ad

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Machine Learning_overview_presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Spectroscopy.pptx food analysis technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Programs and apps: productivity, graphics, security and other tools
Machine Learning_overview_presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Assigned Numbers - 2025 - Bluetooth® Document
MIND Revenue Release Quarter 2 2025 Press Release
Spectroscopy.pptx food analysis technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Ad

Understanding Asset Risk Via Vulnerability Prioritization