CISO Tradecraft®

#173 - Mastering Vulnerability Management


Listen Later

In this episode of CISO Tradecraft, host G Mark Hardy delves into the critical subject of vulnerability management for cybersecurity leaders. The discussion begins with defining the scope and importance of vulnerability management, referencing Park Foreman's comprehensive approach beyond mere patching, to include identification, classification, prioritization, remediation, and mitigation of software vulnerabilities. Hardy emphasizes the necessity of a strategic vulnerability management program to prevent exploitations by bad actors, illustrating how vulnerabilities are exploited using tools like ExploitDB, Metasploit, and Shodan. He advises on deploying a variety of scanning tools to uncover different types of vulnerabilities across operating systems, middleware applications, and application libraries. Highlighting the importance of prioritization, Hardy suggests focusing on internet-facing and high-severity vulnerabilities first and discusses establishing service level agreements for timely patching. He also covers optimizing the patching process, the significance of accurate metrics in measuring program effectiveness, and the power of gamification and executive buy-in to enhance security culture. To augment the listener's knowledge and toolkit, Hardy recommends further resources, including OWASP TASM and books on effective vulnerability management.

Transcripts: https://docs.google.com/document/d/13P8KsbTOZ6b7A7HDngk9Ek9FcS1JpQij

OWASP Threat and Safeguard Matrix - https://owasp.org/www-project-threat-and-safeguard-matrix/

Effective Vulnerability Management - https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207

Chapters

  • 00:00 Introduction
  • 00:56 Understanding Vulnerability Management
  • 02:15 How Bad Actors Exploit Vulnerabilities
  • 04:26 Building a Comprehensive Vulnerability Management Program
  • 08:10 Prioritizing and Remediation of Vulnerabilities
  • 13:09 Optimizing the Patching Process
  • 15:28 Measuring and Improving Vulnerability Management Effectiveness
  • 18:28 Gamifying Vulnerability Management for Better Results
  • 20:38 Securing Executive Buy-In for Enhanced Security
  • 21:15 Conclusion and Further Resources
  • ...more
    View all episodesView all episodes
    Download on the App Store

    CISO Tradecraft®By CISO Tradecraft®

    • 4.8
    • 4.8
    • 4.8
    • 4.8
    • 4.8

    4.8

    48 ratings


    More shows like CISO Tradecraft®

    View all
    Risky Business by Patrick Gray

    Risky Business

    362 Listeners

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

    634 Listeners

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

    368 Listeners

    Hacked by Hacked

    Hacked

    176 Listeners

    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,011 Listeners

    Smashing Security by Graham Cluley & Carole Theriault

    Smashing Security

    305 Listeners

    Click Here by Recorded Future News

    Click Here

    386 Listeners

    Malicious Life by Malicious Life

    Malicious Life

    919 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    7,841 Listeners

    Cybersecurity Today by Jim Love

    Cybersecurity Today

    142 Listeners

    CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

    CISO Series Podcast

    182 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    308 Listeners

    Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

    Defense in Depth

    71 Listeners

    Cyber Security Headlines by CISO Series

    Cyber Security Headlines

    117 Listeners

    Risky Bulletin by risky.biz

    Risky Bulletin

    33 Listeners