Vulnerability & Exploit Trends: A Deep Look Inside the DataKenna
Michael Roytman, Data Scientist, Kenna & Ed Bellis, CEO, Kenna (BSidesLV, 2013)
While the past isn’t a direct indication of future performance, knowing the past is essential to predicting the future. In security, this requires reviewing large quantities of vulnerability, defect and exploit data to fully understand how attackers are likely to approach their task.
This presentation by Kenna CEO Ed Bellis, and Data Scientist Michael Roytman covers vulnerability statistics as it relates to fixing security issues by:
Examining the overlapping data generated from 20 of the leading security tools on the market
Comparing & contrasting this with the output of multiple breach reports and database
Extracting trends that may be important in helping to reduce the number of breaches in the future
This is based on research from over 30M vulnerabilities analyzed over the past 12 months, generated across some of the largest corporations in the world.
Take a look at this presentation to learn how others are remediating vulnerabilities, how effective their efforts are, and how they could do it a little bit better.
Vulnerability & Exploit Trends: A Deep Look Inside the DataKenna
Michael Roytman, Data Scientist, Kenna & Ed Bellis, CEO, Kenna (BSidesLV, 2013)
While the past isn’t a direct indication of future performance, knowing the past is essential to predicting the future. In security, this requires reviewing large quantities of vulnerability, defect and exploit data to fully understand how attackers are likely to approach their task.
This presentation by Kenna CEO Ed Bellis, and Data Scientist Michael Roytman covers vulnerability statistics as it relates to fixing security issues by:
Examining the overlapping data generated from 20 of the leading security tools on the market
Comparing & contrasting this with the output of multiple breach reports and database
Extracting trends that may be important in helping to reduce the number of breaches in the future
This is based on research from over 30M vulnerabilities analyzed over the past 12 months, generated across some of the largest corporations in the world.
Take a look at this presentation to learn how others are remediating vulnerabilities, how effective their efforts are, and how they could do it a little bit better.