The Evil Internet: Vulnerability Prioritization Through the Eyes of Hackers

Logo
Presented by

David Habusha, VP Product at WhiteSource & Paulo Shakarian, CEO at CYR3CON

About this talk

It’s a fact: software development teams are constantly bombarded with an increasingly high number of security alerts. Since fixing all vulnerabilities is unrealistic, it’s imperative that teams find a method to zero in on the security vulnerabilities that matter. The key: prioritization. But, there’s a big question: Which is the best way to prioritize? There are certainly multiple ways teams can determine what to remediate first, but which are the best practices? And how does this correlate with the hacker community’s choices? We’ve looked at the data - and it’s certainly not what you think. Join David Habusha, VP Product at WhiteSource & Paulo Shakarian, CEO at CYR3CON, as they discuss: - The top 5 most common ways organizations prioritize security vulnerabilities - How each approach correlates with the perspective of the hacker community - The 2 best vulnerability prioritization approaches
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (41)
Subscribers (16952)
Mend, formerly known as WhiteSource, effortlessly secures what developers create. Mend uniquely removes the burden of application security, allowing development teams to deliver quality, secure code, faster. With a proven track record of successfully meeting complex and large-scale application security needs, the world’s most demanding software developers rely on Mend. The company has more than 1,000 customers, including 25 percent of the Fortune 100, and manages Renovate, link here, the open-source automated dependency update project. For more information, visit www.mend.io, the Mend blog, and Mend on LinkedIn and Twitter.