How to Operationalize Vulnerability Threat Intelligence

How to Operationalize Vulnerability Threat Intelligence

Dec 20, 2023

With so many vulnerabilities to address and potential threats looming, how can organizations prioritize and respond effectively? Enter Vulnerability Threat Intelligence (VTI). This knowledge not only aids in pinpointing vulnerabilities but also shapes strategies for risk acceptance and rapid responses to zero-day threats.

Join our webinar where Patrick Garrity from Nucleus Security, Caleb Hoch from Google, and Jared Semrau from Mandiant, uncover how to effectively leverage vulnerability threat intelligence (VTI).

Throughout the discussion, you will learn:

  1. Mandiant’s Unique Approach to Threat Intelligence: Learn how different components of Threat Intelligence are harmoniously utilized to gauge the true impact of vulnerabilities.
  2. Strategies for Prioritizing Vulnerabilities: Transition from mere patch prioritization to an informed strategy, backed by actionable threat intelligence insights.

3, Operationalizing Threat Intelligence: Discover real-world techniques, using tools like Splunk and Chronicle paired with Nucleus data, to provide context and power to your security operations centers.

  1. Rapid Response Protocols for Zero-Day Threats: Equip yourself with knowledge to preemptively tackle zero-day vulnerabilities and other imminent cyber threats.

By the end of our session, participants will gain a comprehensive understanding of how to weave vulnerability threat intelligence into their cyber defense strategies, coupled with actionable insights to stay ahead of threats.

Chapters

08:17 Time-to-exploit trends

12:20 Exploitation of old vulnerabilities

14:57 Zero day refers to exploitation before a patch is released.

16:18 What is Vulnerability intelligence?

22:21 Threat and vulnerability management (TVM)

25:54 Introduction to using Mandiant vulnerability intelligence in decision-making

26:43 Differentiating between risk rating and CVSS

28:15 Difference between threat intelligence and vulnerability intelligence

29:49 Comparison of risk rating and CVSS scoring system

32:17 Importance of risk-based approach in vulnerability management

36:49 Being prepared for zero-day vulnerabilities

48:44 Nucleus and Mandiant threat intelligence integration.

54:45 Time-saving and defendable nature of threat intelligence

56:16 Operationalizing zero-day vulnerabilities
1:00:17 Announcement of next month's topic and product demo