Intelligent CISO Issue 32 | Page 68

The need for RVBM is driven by the fact that modern largescale enterprise networks tend to contain more vulnerabilities than their cybersecurity teams can realistically fix .
decrypting myths

The need for RVBM is driven by the fact that modern largescale enterprise networks tend to contain more vulnerabilities than their cybersecurity teams can realistically fix .

driven by the fact that modern largescale enterprise networks tend to contain more vulnerabilities than their cybersecurity teams can realistically fix .
RBVM allows teams to quickly assess vulnerabilities and address them in the most logical order , rather than taking a scattergun approach or focusing on areas of lower risk while high-risk vulnerabilities remain unpatched . Effective RBVM strategies are typically made up of several core components :
1 . They use threat intelligence to identify the vulnerabilities attackers are discussing , experimenting with , or using .
2 . They utilise this intelligence to generate risk scores based on the likelihood of exploitation .
3 . They take into account the business context of various assets because intrusion into some segments of a network may be more damaging or likely than others .
4 . By combining vulnerability risk assessment and asset criticality , patching efforts can then be focused on the vulnerabilities that are most likely to be exploited and that reside on the most critical systems .
Putting RBVM into action
Below are a series of commonly asked security questions from CEOs across a wide range of industries , along with examples of how CISOs can use RBVM to not only answer them , but also start driving cultural change in the process .
What security issues are most likely to affect us and what business impact would they have ?
A broad question like this means the CEO is trying to gain a better understanding of security risk through the likelihood and impact of any given scenario . The good news is that if they ’ re asking this type of question , it means the security culture already in place at the business is a lot more mature than many others . Using RBVM will enable you to quickly point out which vulnerabilities are most likely to be exploited and the risk tolerance for each , based on how important a system is .
I saw the news about < X >. Are we protected against that ?
Anyone who has ever been a CISO will almost certainly have fielded this question at some point . Whether it ’ s the latest high-profile breach or an article warning about the risks posed by a new form of malware , this question will often have you scrambling to answer it quickly
68 www . intelligentciso . com