On a DATA with Vulnerability Exploitability, the real meaning of vulnerabilities leveraging the power of data visualization


Vulnerability management and exploitability from code to cloud: will explore the data that sits behind prioritization and data-driven approach to vulnerability management, focusing on data visualization

Posture and Data don’t lie – risk and fact-driven approach to posture management with a deep dive into exploitability, reliability and the likelihood of exploitation. 

Francesco Cipollone Risk-based approach on vulnerability – the power of visualization

Abstract Vulnerability meaning and data visualization for exploitability

Posture is the art of representing complex problems in simple risk-based visualization. Risk posture had a lot of hidden measurements and data and was treated like esoteric art. In this talk, we explore various concepts like Exploitation, the likelihood of exploitability, Context and location of an asset and how it influences the exploitability, business impact and how to involve business with risk-based driven metrics. 

The talk focus on data-driven research and visualisation techniques analysing what’s more exploitable from different data sources. 

we will explore the true vulnerability meaning with data driven visualization

We will explore the difference between a vulnerability base approach and resolution first vs a risk-based approach and success from real case scenarios. 

Find your path in this modern, challenging.  

Writeup on exploitability data: 

Writeup on CISA KEV:  

Audience for Vulnerability and data visualization for exploitability

  • application security
  • Vulnerability management
  • head of application security
  • product security
  • security engineers 
  • CISO
  • GRC 

Take away from Vulnerability and data visualization for exploitability talk.

  • Learning how to start measuring a posture management program in application security and vulnerability management leveraging risk
  • metrics for an application security program
  • How to create a narrative around security with product security
  • How to involve management/business on the heartbeat of application security 
  • Understand the concept of the product.
  • Understand and apply how to involve the business and insert business criticality.
  • Understanding the concept of prioritization and the data behind it
  • Understand and leverage exploitability, probability of exploitation, and likelihood of exploitation.
  • Understand and apply contextual elements to application security and vulnerability management. 
  • Understand which Threat feed is actually valid and how to automate CTI.

Francesco Cipollone (Speaker)

Francesco is a seasoned entrepreneur, CEO of the Contextual-based vulnerability management platform from code to cloud Phoenix Security, author of several books, host of multi-award Cyber Security & Cloud Podcast, speaker and known in the cybersecurity industry and recognized for his visionary views. He currently serves as Chapter Chair UK&I of the Cloud Security Alliance. Previously, Francesco headed HSBC’s application and cloud security and was Senior Security Consultant at AWS. Francesco has been keynoting at global conferences and has authored and co-authored several books. Outside of work, you can find me running marathons, snowboarding on the Italian slopes, and enjoying single malt whiskeys in one of my favourite London clubs.



Main information


Phoenix Security

From our Events

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x Logo: ShieldPRO
This Site Is Protected By