In this episode of CISO Tradecraft, host G Mark Hardy delves into the critical subject of vulnerability management for cybersecurity leaders. The discussion begins with defining the scope and importance of vulnerability management, referencing Park Foreman's comprehensive approach beyond mere patching, to include identification, classification, prioritization, remediation, and mitigation of software vulnerabilities. Hardy emphasizes the necessity of a strategic vulnerability management program to prevent exploitations by bad actors, illustrating how vulnerabilities are exploited using tools like ExploitDB, Metasploit, and Shodan. He advises on deploying a variety of scanning tools to uncover different types of vulnerabilities across operating systems, middleware applications, and application libraries. Highlighting the importance of prioritization, Hardy suggests focusing on internet-facing and high-severity vulnerabilities first and discusses establishing service level agreements for timely patching. He also covers optimizing the patching process, the significance of accurate metrics in measuring program effectiveness, and the power of gamification and executive buy-in to enhance security culture. To augment the listener's knowledge and toolkit, Hardy recommends further resources, including OWASP TASM and books on effective vulnerability management.
Transcripts: https://docs.google.com/document/d/13P8KsbTOZ6b7A7HDngk9Ek9FcS1JpQij
OWASP Threat and Safeguard Matrix - https://owasp.org/www-project-threat-and-safeguard-matrix/
Effective Vulnerability Management - https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207
Chapters
#120 - Negotiating Your Best CISO Package (with Michael Piacente)
#119 - Ethics (with Stephen Northcutt)
#118 - Data Engineering (with Gal Shpantzer)
#117 - Good Governance (with Sameer Sait)
#116 - A European view of CISO responsibilities (with Michael Krausz)
#115 - The Business Case for a Global Lead of Field Cybersecurity (with Joye Purser)
#114 - One Vendor to Secure Them All
#113 - SAST Security (with John Steven)
#112 - Attack Surface Management (with Richard Ford)
#111 - Leading with Style
#110 - CISO Predictions for 2023
#109 - The Right Stuff
#108 - Show Me The Money (with Nick Vigier)
#107 - Consolidating Vulnerability Management (with Jeff Gouge)
#106 - How to Win Your First CISO Role
#105 - Start Me Up (with Bob Cousins)
#104 - Breach and Attack Simulation (with Dave Klein)
#103 - Listening to the Wise (with Bill Cheswick)
#102 - Mentorship, Sponsorship, and A Message to Garcia
#101 - SaaS Security Posture Management (with Ben Johnson)
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon