Tas Jalali, CISSP, CISM, CEH
Principal Security Engineer
Predictive Prioritization Focusing On What Matters First
Predictive Prioritization Focusing On What Matters First Tas - - PowerPoint PPT Presentation
Predictive Prioritization Focusing On What Matters First Tas Jalali, CISSP, CISM, CEH Principal Security Engineer Vulnerability Management In Brief A Assess Legacy and A Modern Assets Remediate Intelligent R Prioritization M R
Tas Jalali, CISSP, CISM, CEH
Principal Security Engineer
Predictive Prioritization Focusing On What Matters First
Vulnerability Management In Brief
Assess – Legacy and Modern Assets Remediate – Intelligent Prioritization Manage – Measure
A R M A R M
3
Prioritization Is Critical
4
Risk-Driven Scoring
CVSS
Critical High Medium Low
Cyber Exposure Score (risk-based)
Critical High Medium Low
5
THE THREE KEY QUESTIONS
A
Where are we exposed? Where should we prioritize based on risk?
R
How are we reducing exposure
M
Number of Vulnerabilities During the Past Decade
894 1020 1677 2156 1527 2451 4935 6610 6520 5632 5736 4652 4155 5297 5191 7946 6484 6447 14714 16555 1085 2000 4000 6000 8000 10000 12000 14000 16000 18000
199920002001200220032004200520062007200820092010201120122013201420152016201720182019
VULNERABILITIES DISCOVERED EACH YEAR
Source: NVD
7
an exploit available
in environments are CVSS 7+
2017 were CVSS 9+
VULNERABILITIES DISCLOSED IN 2018
IF EVERYTHING IS IMPORTANT – NOTHING IS
8
59% High or Critical
Vulnerability Intelligence Report Tenable Research
* Gartner Market Guide for Vulnerability Assessment, Craig Lawson, Prateek Bhajanka, June 19, 2018
Number of Vulnerabilities During the Past Decade
HAYSTACK GETTING BIGGER HARDER TO FIND THE NEEDLES
10
with exploits published
vulnerabilities every week.
Vulnerability Intelligence Report Tenable Research
REDUCING THE BURDEN - DRAMATICALLY
11
Threat Intelligence
Insight into which vulnerabilities are actively being exploited by both targeted and
Vulnerability Rating
The criticality, ease of exploit and attack vectors associated with the flaw.
Research Insights
Data science based analysis of over 109,000 vulnerabilities to differentiate between the real and theoretical risks vulnerabilities pose
Reduction in vulnerabilities to be remediated with the same impact to the attack surface
PRIORITIZATION
PREDICTIVE
13
SOME OF WHAT’S IN THE MODEL
14
VPR INSIGHT - 70 DAYS PRIOR TO CVSS SCORE
CVSS VPR
Linux Kernel Flaw
A DATA SCIENCE APPROACH UNDERSTANDING THE MODEL
150 different aspects in 7 feature groups
▪ Past threat pattern ▪ CVSS ▪ NVD ▪ Past hostility ▪ Vulnerable software ▪ Exploit code ▪ Past threat source
Over 109,000 vulnerabilities tracked Forecast probability of exploit in near term future Updated daily
Identify What Matters
3%-5%
Dynamic Prioritization
The attack surface is expanding
17Server Desktop Network infrastructure ICS/SCADA Industrial IoT Web app Mobile Laptop Enterprise IoT Virtual machine Cloud Container
IT Cloud IoT
§ T § AS MO M A EX § HI E TR HA W GR
Creating a Cyber Exposure Gap
18Server Desktop Network infrastructure ICS/SCADA Web app Mobile Laptop Enterprise IoT Virtual machine Cloud Container
IT Cloud IoT
Industrial IoT
§ T ADDIT CY C AN § P P T N C AS T SE
19
Your Cyber Exposure Command Center
Prioritize
Advanced risk-based exposure scoring weighs vulnerabilities, threats, asset value and location, providing clear guidance about what to focus on
Identify
Visualizations of the entire modern attack surface to allow anyone, from analyst to executive, to quickly understand and explore their organization’s Cyber Exposure
Business Context
Benchmark by combining vulnerability data with asset business criticality and threat context and focus on the issues that matter most to the business
Company Confidential: Do Not DistributeSummary
ü Vulnerability overload ü Lack of visibility into global assets and Cyber Exposure ü Lack of quantitative approach to prioritize remediation & Measure reduction in Cyber Exposure
Address Longstanding VM Challenges
ü Improve decision making ü Business context for vulnerability management ü Present security information in business terms
Provide Greater Business Value
ü How many vulnerabilities do you deal with every month? ü Do you patch every vulnerability? ü What does that cost your organization? ü How do you prioritize? ü Do you use threat intelligence? ü Could staff be more efficient?
21
KEY QUESTIONS
Thank You