How to Operationalize Vulnerability Threat Intelligence
With so many vulnerabilities to address and potential threats looming, how can organizations prioritize and respond effectively? Enter Vulnerability Threat Intelligence (VTI). This knowledge not only aids in pinpointing vulnerabilities but also shapes strategies for risk acceptance and rapid responses to zero-day threats.
Join our webinar where Patrick Garrity from Nucleus Security, Caleb Hoch from Google, and Jared Semrau from Mandiant, uncover how to effectively leverage vulnerability threat intelligence (VTI).
Throughout the discussion, you will learn:
- Mandiant’s Unique Approach to Threat Intelligence: Learn how different components of Threat Intelligence are harmoniously utilized to gauge the true impact of vulnerabilities.
- Strategies for Prioritizing Vulnerabilities: Transition from mere patch prioritization to an informed strategy, backed by actionable threat intelligence insights.
3, Operationalizing Threat Intelligence: Discover real-world techniques, using tools like Splunk and Chronicle paired with Nucleus data, to provide context and power to your security operations centers.
- Rapid Response Protocols for Zero-Day Threats: Equip yourself with knowledge to preemptively tackle zero-day vulnerabilities and other imminent cyber threats.
By the end of our session, participants will gain a comprehensive understanding of how to weave vulnerability threat intelligence into their cyber defense strategies, coupled with actionable insights to stay ahead of threats.
Chapters
08:17 Time-to-exploit trends
12:20 Exploitation of old vulnerabilities
14:57 Zero day refers to exploitation before a patch is released.
16:18 What is Vulnerability intelligence?
22:21 Threat and vulnerability management (TVM)
25:54 Introduction to using Mandiant vulnerability intelligence in decision-making
26:43 Differentiating between risk rating and CVSS
28:15 Difference between threat intelligence and vulnerability intelligence
29:49 Comparison of risk rating and CVSS scoring system
32:17 Importance of risk-based approach in vulnerability management
36:49 Being prepared for zero-day vulnerabilities
48:44 Nucleus and Mandiant threat intelligence integration.
54:45 Time-saving and defendable nature of threat intelligence
56:16 Operationalizing zero-day vulnerabilities
1:00:17 Announcement of next month's topic and product demo