Главная
Study mode:
on
1
Introduction
2
I am not a security professional
3
What I do have
4
More can happen than oil
5
Bad remediation metrics
6
Fix what matters
7
Live vulnerabilities
8
Baseline
9
The Takeaway
10
Why Asset Management Is Broken
11
The Ordinal Scale
12
The Data
13
Ground Truth Metrics
14
Riskiest Vulnerability
15
Building a Model
16
Ranking the Order
17
Why This Is Better
18
Asset Groups
19
Benefits of Asset Management
20
Models
21
Network Placement
22
When to close vulnerabilities
23
The numbers game
24
Userland vs target attacks
25
Mitigating controls
26
Asset prioritization
27
Two types of criticality
28
How to measure
29
The challenge classification
Description:
Explore a comprehensive analysis of asset management flaws and potential solutions in this 52-minute conference talk from BSides Chicago. Delve into the shortcomings of current remediation metrics and learn how to prioritize fixing vulnerabilities that truly matter. Examine the concept of live vulnerabilities and understand the importance of establishing a baseline. Discover why traditional asset management approaches fall short and gain insights into building a more effective model using ordinal scales and ground truth metrics. Investigate the benefits of improved asset management, including network placement strategies and optimal timing for vulnerability closure. Analyze the distinctions between userland and target attacks, and learn how to implement mitigating controls. Gain a deeper understanding of asset prioritization, exploring two types of criticality and methods for measurement. Conclude by addressing the challenge of classification in cybersecurity asset management.

Comparing Risks: Why Asset Management Is Broken and How to Fix It

Add to list
0:00 / 0:00