\Reading the Security Tea Leaves" - The Story from 50 million Vulnerabilities"

  • Webcast Aired Thursday, 07 Nov 2013 12:00PM EST (07 Nov 2013 17:00 UTC)
  • Speakers: Matt Johansen, Ed Bellis

The story is in the data. What can the IT security industry learn from taking a look at past trends in vulnerability stats, exploit trends, and information from a 'blackhat' who has decided to go legit?While many IT security professionals shy away from listening to anything from the dark side, much can be learned from knowing your adversary and what makes them tick. Learn insights into where your defense strategy might be at risk and what methods hackers are deploying to thwart current security measures.

By combining hacker attack data with an aggregation from the leading security tools on the market we can start to build a comprehensive defense strategy.We will examine the overlapping data generated from the aforementioned tools and how they relate to the public breach reports and databases we have access to. The audience will start to see trends in this data that includes 50,000,000 vulnerabilities analyzed over the past 12 months from some of the largest corporations in the world.

Attendees will learn:

  • What can we learn from listening to the dark side? Hacker Intel Exposed
  • Attack Trends from analyzing over 50,000,000 vulnerabilities culled from F500 companies
  • How to build a defense strategy based on the aggregated attack data
  • Lessons from running attack data thru 20 leading security products
  • Bridging the gap between security tool data and public breach information