Unsolicited Response

Chris Hughes, Author of Effective Vulnerability Management


Listen Later

Chris Hughes and Nikki Robinson recently wrote the book Effective Vulnerability Management. Dale and Chris discuss the topic and book including:

  • The definition and scope of vulnerabilities. It’s much more than coding errors that need patches.

  • Are ICS protocols lacking authentication “vulnerabilities”

  • The reality that most organizations have 100’s of thousands of unpatched vulnerabilities. Some statistics and will this change.

  • Ways to prioritize what vulnerabilities you address.

  • The SSVC decision tree approach that was introduced at S4 as Never, Next, Now

  • Tooling … vulnerability management, software configuration, ticketing, remediation.

  • And much more.

 

Links:

  • Effective Vulnerability Management, https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207/

  • Dale’s ICS-Patch Decision Tree, https://dale-peterson.com/wp-content/uploads/2020/10/ICS-Patch-0_1.pdf

 

...more
View all episodesView all episodes
Download on the App Store

Unsolicited ResponseBy Dale Peterson: ICS Security Catalyst and S4 Conference Chair

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

14 ratings


More shows like Unsolicited Response

View all
Risky Business by Patrick Gray

Risky Business

369 Listeners

The Daily by The New York Times

The Daily

112,500 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,961 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

173 Listeners

The Industrial Security Podcast by PI Media

The Industrial Security Podcast

21 Listeners

The Rest Is History by Goalhanger

The Rest Is History

14,009 Listeners

The Mel Robbins Podcast by Mel Robbins

The Mel Robbins Podcast

20,151 Listeners