Главная
Study mode:
on
1
Intro
2
The Modern Stack is COMPLEX
3
Vulnerability Volume Increasing
4
Remember the Recall
5
What Matters for Scoring
6
Measuring Remediation Strategies
7
Coverage & Efficiency, Explained
8
Coverage / Efficiency Tradeoff
9
Current Attacker Velocity
10
Factoring in Velocity
11
The Case for Prediction
12
What Is Machine Learning?
13
Data Sources: CVE Enrichment Projects
14
Data Sources: Exploit Code & Observations
15
Type of Algorithms
16
Supervised Classification
17
Predictive - The Expectations
18
Coverage Efficiency Tradeoffs
19
Machine Learning Has Side Benefits
20
Lesson: Probability is our friend
Description:
Explore a groundbreaking machine learning classifier for data-driven vulnerability prioritization in this Black Hat conference talk. Delve into the complexities of modern technology stacks, increasing vulnerability volumes, and the challenges of effective remediation strategies. Learn about measuring coverage and efficiency in vulnerability management, current attacker velocities, and the case for predictive approaches. Gain insights into machine learning applications for cybersecurity, including data sources, algorithm types, and supervised classification. Discover how probability can be leveraged to improve decision-making in vulnerability and risk management, and witness live predictions and fulfillments during this 50-minute session presented by Kenna researchers Michael Roytman and Jonathan Cran.

Those Don't Matter! Effective Prioritization Through Exploit Prediction

Black Hat
Add to list
0:00 / 0:00