<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Evidence of risk materialization for server vulnerabilities in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Evidence-of-risk-materialization-for-server-vulnerabilities/m-p/20421#M1032</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/884809339"&gt;@A2jacomel&lt;/a&gt;I have had a thought about this since you put this up overnight:&amp;nbsp;&amp;nbsp; One thought is that some vulnerability service management providers, are now providing online cloud services, which include weaponisation.&amp;nbsp;&amp;nbsp; What I mean by this is&amp;nbsp; - instead of the traditional Mitre/CVE approach, they combine the service with actual live security intelligence - so this means instead of obtaining the latest highest priority according to impact - you get a report online based on what the real cyber-criminals are actually focusing upon - which in changes the equation to one of more a risk materialisation approach i.e. higher likelihood that those systems/applications are currently and likely to be under attack and therefore your priority would be to patch those systems/applications now thus reducing the potential impact to the organisation, had they used the traditional approach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But a month, later of course the results will have changed again, as they cyber-criminals will be focusing on something else etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Sun, 24 Mar 2019 23:04:09 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2019-03-24T23:04:09Z</dc:date>
    <item>
      <title>Evidence of risk materialization for server vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Evidence-of-risk-materialization-for-server-vulnerabilities/m-p/20412#M1031</link>
      <description>&lt;P&gt;For Internal audit or another supervisor entity, have you ever been in the obligation of demostrate that your risks associated to infrastructure vulnerabilities have not been materialized? How have you done it? Which logs or documental supports may I use?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:09:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Evidence-of-risk-materialization-for-server-vulnerabilities/m-p/20412#M1031</guid>
      <dc:creator>A2jacomel</dc:creator>
      <dc:date>2023-10-09T09:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Evidence of risk materialization for server vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Evidence-of-risk-materialization-for-server-vulnerabilities/m-p/20421#M1032</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/884809339"&gt;@A2jacomel&lt;/a&gt;I have had a thought about this since you put this up overnight:&amp;nbsp;&amp;nbsp; One thought is that some vulnerability service management providers, are now providing online cloud services, which include weaponisation.&amp;nbsp;&amp;nbsp; What I mean by this is&amp;nbsp; - instead of the traditional Mitre/CVE approach, they combine the service with actual live security intelligence - so this means instead of obtaining the latest highest priority according to impact - you get a report online based on what the real cyber-criminals are actually focusing upon - which in changes the equation to one of more a risk materialisation approach i.e. higher likelihood that those systems/applications are currently and likely to be under attack and therefore your priority would be to patch those systems/applications now thus reducing the potential impact to the organisation, had they used the traditional approach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But a month, later of course the results will have changed again, as they cyber-criminals will be focusing on something else etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sun, 24 Mar 2019 23:04:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Evidence-of-risk-materialization-for-server-vulnerabilities/m-p/20421#M1032</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-03-24T23:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: Evidence of risk materialization for server vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Evidence-of-risk-materialization-for-server-vulnerabilities/m-p/20469#M1041</link>
      <description>Thanks! That is very interesting. I think is a good approach to risk based on cyber intelligence.</description>
      <pubDate>Tue, 26 Mar 2019 09:41:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Evidence-of-risk-materialization-for-server-vulnerabilities/m-p/20469#M1041</guid>
      <dc:creator>A2jacomel</dc:creator>
      <dc:date>2019-03-26T09:41:10Z</dc:date>
    </item>
  </channel>
</rss>

