威胁和漏洞响应最佳实践.pdf

编号:187767 PDF 43页 2.23MB 下载积分:VIP专享
下载报告请您先登录!

威胁和漏洞响应最佳实践.pdf

1、Threat&Vulnerability Response Best PracticesTRACKING&MITIGATING EMERGING THREATSTodays Presenter ProcessUnity,Inc.All Rights Reserved.2Sophia CorsettiProduct Marketing ManagerA Day in the Life on July 19th CROWDSTRIKE RESPONSEI just got an alert about CrowdStrike.Are our vendors impacted?TVR notifie

2、d us this morning and we started analyzing our high-risk vendors.Of our 25 high-risk vendors,13 are down due to CrowdStrike.Were reaching out now.The State of Emerging Threats Response Process Basics&Ideal State Critical Components for a Mature Process Effective&Efficient Threat&Vulnerability Respon

3、se SummaryTodays Agenda ProcessUnity,Inc.All Rights Reserved.4Found Vulnerabilities Continue to IncreaseSource:2023 Threat Landscape Year in Review:If Everything is Critical,Nothing Is(Qualys)Link:https:/ Vulnerabilities Continue to Increase570 HIGH-RISK VULNERABILITIES IN 2023Source:2023 Threat Lan

4、dscape Year in Review:If Everything is Critical,Nothing Is(Qualys)Link:https:/ Vulnerabilities Follow AlongSource:CISA.govLink:https:/www.cisa.gov/known-exploited-vulnerabilities-catalogEmerging Threat ScenariosNon-application associated threats(Ransomware,DDoS)Threat Intelligence(dark web monitorin

5、g,third-party breaches,CrowdStrike)Known Exploited Vulnerabilities(CISA KEVs)Threat&Vulnerability Response:The Basic ProcessIDENTIFYMonitor advisories for critical vulnerabilities.ASSESSScope and bulk-assess potentially affected third parties.PRIORITIZEDetermine which third parties should be assesse

6、d.REPORTCapture and distribute findings and recommendations.Too many alerts which ones matter?Too many vendors which ones are in scope?Too many manual processes slow and inefficient Disrupts our“day job”assessment processesBut its Not So SimpleA COMPLICATED PROCESS REQUIRES NEW THINKINGUltimately,Th

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(威胁和漏洞响应最佳实践.pdf)为本站 (学无止境) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠