Events

On a DATA with Vulnerability Exploitability, the real meaning of vulnerabilities leveraging the power of data visualization

Event

Vulnerability management and exploitability from code to cloud: will explore the data that sits behind prioritization and a data-driven approach to vulnerability management, focusing on data visualization

Posture and Data don’t lie – risk and fact-driven approach to posture management with a deep dive into exploitability, reliability and the likelihood of exploitation. 

Francesco Cipollone Risk-based approach on vulnerability – the power of visualization

All data and diagrams available to explore:

Abstract Vulnerability meaning and data visualization for exploitability

Posture is the art of representing complex problems in simple risk-based visualization. Risk posture had a lot of hidden measurements and data and was treated like esoteric art. In this talk, we explore various concepts like Exploitation, the likelihood of exploitability, Context and location of an asset and how it influences the exploitability, business impact and how to involve business with risk-based driven metrics. 

The talk focus on data-driven research and visualisation techniques analysing what’s more exploitable from different data sources. 

we will explore the true vulnerability meaning with data driven visualization

We will explore the difference between a vulnerability base approach and resolution first vs a risk-based approach and success from real case scenarios. 

Find your path in this modern, challenging.  

Writeup on exploitability data: https://phoenix.security/exploitability-data-visualization/ 

Writeup on CISA KEV: https://phoenix.security/cisa-kev-visualization/  

Audience for Vulnerability and data visualization for exploitability

  • application security
  • Vulnerability management
  • head of application security
  • product security
  • security engineers 
  • CISO
  • GRC 

Take away from Vulnerability and data visualization for exploitability talk.

  • Learning how to start measuring a posture management program in application security and vulnerability management leveraging risk
  • metrics for an application security program
  • How to create a narrative around security with product security
  • How to involve management/business on the heartbeat of application security 
  • Understand the concept of the product.
  • Understand and apply how to involve the business and insert business criticality.
  • Understanding the concept of prioritization and the data behind it
  • Understand and leverage exploitability, probability of exploitation, and likelihood of exploitation.
  • Understand and apply contextual elements to application security and vulnerability management. 
  • Understand which Threat feed is actually valid and how to automate CTI.

Francesco Cipollone (Speaker)

Francesco is a seasoned entrepreneur, CEO of the Contextual-based vulnerability management platform from code to cloud Phoenix Security, author of several books, host of multi-award Cyber Security & Cloud Podcast, speaker and known in the cybersecurity industry and recognized for his visionary views. He currently serves as Chapter Chair UK&I of the Cloud Security Alliance. Previously, Francesco headed HSBC’s application and cloud security and was Senior Security Consultant at AWS. Francesco has been keynoting at global conferences and has authored and co-authored several books. Outside of work, you can find me running marathons, snowboarding on the Italian slopes, and enjoying single malt whiskeys in one of my favourite London clubs.

Linkedin: https://www.linkedin.com/in/fracipo/

Twitter: https://twitter.com/FrankSEC42

Main information

fc@appsecphoenix.com

Organiser

Phoenix Security

From our Events

Thanks, Your event registration has been submitted successfully.​

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.