ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

No Action Required: CVE for Software as a Service

Автор: FIRST

Загружено: 2025-05-29

Просмотров: 86

Описание: Art Manion (ANALYGENCE Labs, US), Lisa Olson (Microsoft, US), Don Bailey (AWS, US), Michael Coté (Google , US)

Art Manion spends a lot of time working on various aspects of cybersecurity vulnerabilities including coordinated disclosure, measurement, response prioritization, and public policy. Art has led and contributed to vulnerability-related efforts the Forum of Incident Response and Security Teams (FIRST), the CVE Program, ISO/IEC JTC 1/SC 27, and the (US) National Telecommunications and Information Administration (NTIA). Art is the is the Deputy Director of ANALYGENCE Labs where he works closely with the (US) Cybersecurity and Infrastructure Security Agency (CISA). Art previously managed vulnerability analysis at the CERT Coordination Center (CERT/CC).

Lisa Olson is a Principal Security Program Manager at Microsoft, has a lot to do with patch Tuesdays, and a CVE Board member since 2018.

Don "Beetle" Bailey Senior Principal Security Engineer at AWS, previously MITRE, previously U.S. Army.

Michael Coté is a veteran with 82nd Airborne. Lead for Google Cloud VRP and Vulnerability Response which includes publishing CVEs for critical vulnerabilities within Cloud.
--
Fixing or otherwise mitigating a vulnerability requires action. By someone. For user- or customer-controlled software, this “someone” is the user or customer who performs actions such as update, upgrade, patch, make a change configuration, rebuild, or fetch new dependencies. For software as a service, this “someone” is the service provider, while the user or customer may not need to take any material action. A browser refresh, session timeout, or a new API call uses the fixed software. What does it mean to assign CVE IDs to no-user-action” vulnerabilities? What are the costs and benefits? Is there danger of decreasing the CVE signal-to-noise ratio? How do changes in the CNA Operational Rules apply? A panel of major cloud service CNAs will discuss these questions and more.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
No Action Required: CVE for Software as a Service

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Practical Software Bill of Materials: From Generation to Distribution Workshop

Practical Software Bill of Materials: From Generation to Distribution Workshop

The Funny Story of Active Directory Backdooring

The Funny Story of Active Directory Backdooring

Friday Keynote Address - Network Security is a Team Sport, so How Do We Set and Manage the Team

Friday Keynote Address - Network Security is a Team Sport, so How Do We Set and Manage the Team

Automated ATT&CK Technique Chaining

Automated ATT&CK Technique Chaining

MATT'S CHATS Episode 9: Scaling Smart: The 2026 Blueprint for High-Growth Operations

MATT'S CHATS Episode 9: Scaling Smart: The 2026 Blueprint for High-Growth Operations

Как раскусить любого | 14 хитростей Макиавелли

Как раскусить любого | 14 хитростей Макиавелли

Революционизация анализа вредоносного ПО с помощью агентного ИИ: уроки и инновации.

Революционизация анализа вредоносного ПО с помощью агентного ИИ: уроки и инновации.

What's New in CSAF v2.1: Key Updates Explained

What's New in CSAF v2.1: Key Updates Explained

Help Your Kids, Save on Taxes, and More! Interview with Tom Temin from Federal News Network

Help Your Kids, Save on Taxes, and More! Interview with Tom Temin from Federal News Network

One SOC, The Whole SOC, and Nothing But The SOC, So Help Me

One SOC, The Whole SOC, and Nothing But The SOC, So Help Me

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Guardians of the Hypervisor

Guardians of the Hypervisor

Учебное пособие по ClickUp — Как использовать ClickUp для начинающих

Учебное пособие по ClickUp — Как использовать ClickUp для начинающих

От уязвимости к победе: освоение жизненного цикла CVE для разработчиков Java. Энтони Даханн

От уязвимости к победе: освоение жизненного цикла CVE для разработчиков Java. Энтони Даханн

What Can Cybersecurity Incident Responders Learn from Real-World Crises?

What Can Cybersecurity Incident Responders Learn from Real-World Crises?

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

99 Bottles of Trust on the Wall: Approaches to Building Convivial Communities

99 Bottles of Trust on the Wall: Approaches to Building Convivial Communities

The Secret to Vulnerability Management

The Secret to Vulnerability Management

Pro Tips: Construction Lending #hardmoneymastermind #realestate #ConstructionLending #podcast

Pro Tips: Construction Lending #hardmoneymastermind #realestate #ConstructionLending #podcast

Only Seeing Stars: Enabling the Open Source Scripting Community with OCSF

Only Seeing Stars: Enabling the Open Source Scripting Community with OCSF

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]