
Sign up to save your podcasts
Or


In this episode, Patrick Miller speaks with Kylie McClanahan, CTO at Bastazo, about the practical (and often messy) realities of patch and vulnerability management in operational technology (OT) environments. Kylie shares grounded insights into patching challenges, the gaps between IT and OT remediation cycles, and the real-world implications of relying too heavily on scoring systems like CVSS.
The conversation covers CISA’s Known Exploited Vulnerabilities (KEV) catalog, exploring how it’s being used (and possibly misused) in prioritization workflows, and where the disconnects lie between policy directives and operational feasibility. Kylie also critiques the current state of vendor responsiveness, machine-readable vulnerability disclosure (CSAF), and the importance of asset and exposure awareness.
This episode is essential listening for practitioners wrestling with patching fatigue, program prioritization, and the tradeoffs between theoretical vulnerability data and applied security outcomes in critical infrastructure environments.
Links:
CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities
CISA vulnrichment: https://github.com/cisagov/vulnrichment
Vulnrichment, Year One: https://www.youtube.com/watch?v=g5pSVMnWD7k
CISA SSVC: https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc
Carnegie Mellon SSVC: https://certcc.github.io/SSVC/
CSAF: https://www.csaf.io/
VulnCheck KEV: https://vulncheck.com/kev
Kylie McLanahan on LinkedIn: https://www.linkedin.com/in/kyliemcclanahan/
Bastazo: https://bastazo.com
By Anton Shipulin / Listen Notes4.5
88 ratings
In this episode, Patrick Miller speaks with Kylie McClanahan, CTO at Bastazo, about the practical (and often messy) realities of patch and vulnerability management in operational technology (OT) environments. Kylie shares grounded insights into patching challenges, the gaps between IT and OT remediation cycles, and the real-world implications of relying too heavily on scoring systems like CVSS.
The conversation covers CISA’s Known Exploited Vulnerabilities (KEV) catalog, exploring how it’s being used (and possibly misused) in prioritization workflows, and where the disconnects lie between policy directives and operational feasibility. Kylie also critiques the current state of vendor responsiveness, machine-readable vulnerability disclosure (CSAF), and the importance of asset and exposure awareness.
This episode is essential listening for practitioners wrestling with patching fatigue, program prioritization, and the tradeoffs between theoretical vulnerability data and applied security outcomes in critical infrastructure environments.
Links:
CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities
CISA vulnrichment: https://github.com/cisagov/vulnrichment
Vulnrichment, Year One: https://www.youtube.com/watch?v=g5pSVMnWD7k
CISA SSVC: https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc
Carnegie Mellon SSVC: https://certcc.github.io/SSVC/
CSAF: https://www.csaf.io/
VulnCheck KEV: https://vulncheck.com/kev
Kylie McLanahan on LinkedIn: https://www.linkedin.com/in/kyliemcclanahan/
Bastazo: https://bastazo.com

229,169 Listeners

4,349 Listeners

373 Listeners

374 Listeners

653 Listeners

1,022 Listeners

112,408 Listeners

8,039 Listeners

181 Listeners

189 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
92 Listeners

138 Listeners

0 Listeners

0 Listeners

7 Listeners