But I also like what you said about reach ability, mattering if that is a vulnerability that cannot be exercised, it is still a vulnerability, but that then brings us back to prioritization. Should that be the first one that you go fix? No, you've got a bunch of others that you should go fix before it.
- Mike Johnson. - Reachability affects exploitability of vulnerabilities. - Mike Johnson emphasizes prioritizing exploitable issues. - Assessing reachability focuses remediation efforts.This is a good way to introduce people that it's hard if you see this long list of all these things that you need to care about and you're kind of nodding along like, yeah, that'll make sense.
- Mike Johnson. - Many complex factors make vulnerability management challenging. - Mike Johnson notes initial simplicity hides difficulties. - Understanding complexities helps in planning and execution.Why have we conflated vulnerability discovery with vulnerability management? There are lots of tools that classify what's out there, but they don't help us take that next step.
- Discovery tools identify issues but don't assist in remediation. - Recognizing the distinction helps focus on fixing vulnerabilities. - Effective management requires moving beyond discovery.When you have these big problems, this is the old parable of like how do you eat an elephant and it's one bite at a time, you have to start breaking this down.
- Mike Johnson. - Approach large challenges step by step. - Mike Johnson advises breaking down tasks for effective management. - Incremental efforts improve security over time.What does it really mean? How exposed am I, how easy it is to exploit it? What does it mean from a business context perspective and everything else?
- Yaron Levi. - Understanding exposure determines real risk. - Yaron Levi emphasizes assessing exploitability and business impact. - Comprehensive evaluation aids in prioritizing mitigation efforts.So that's why in my head, I also tend to distinguish between patch management and vulnerability management. And I know a lot of people are kind of mix them both.
- Yaron Levi. - Patch management is about operational discipline and hygiene. - Yaron Levi emphasizes that vulnerability management addresses exposure and risk. - Differentiating helps focus on both hygiene and security risks effectively.As Mike said, you know, Dolby has been around for like 60 years and it evolved a lot and change, you know, in those 60 years... To understand the business, to understand the complexity of the business, the different nuances, I'm still learning almost every day.
- Yaron Levi. - Large, long-standing organizations have complex environments. - Yaron Levi emphasizes ongoing learning for effective vulnerability management. - Continuous business understanding aids prioritizing vulnerabilities.First of all, it is key that you are thinking about your own environment and not just as Dennis points out here saying, hey, it's a high, the tool told me it's a high. Therefore it's a high for me, you really need to look at back to the asset management. How important is this thing to us? What does it do? What is it connected to? What are the mitigations that may or may not be in place?
- Mike Johnson. - Context determines the true risk of vulnerabilities in your environment. - Mike Johnson emphasizes assessing vulnerabilities based on their impact to your assets. - Prioritize remediation by understanding asset importance and connections.Now, how demoralizing is that to do something and put all the efforts that the best thing you can ever get to is zero and it's never ending, right? So we have to think completely differently about this problem and how to address it, how to approach it.
- Yaron Levi. - Seek new approaches to make vulnerability management sustainable. - Yaron Levi emphasizes rethinking strategies to prevent staff burnout. - Prioritize effectively instead of trying to fix every vulnerability.This is an interesting topic that shows the evolution of cybersecurity. When vulnerability management started, it was really just scanning, go and find issues, and then like great, we've got this big list of issues, and then teams realized, hey, we need somebody to fix these.
- Mike Johnson. - Vulnerability management evolved from mere discovery to remediation. - Mike Johnson emphasizes the need for organizations to focus on fixing vulnerabilities, not just finding them. - Prioritizing remediation efforts reduces risk to the business.