Skip to main content

Presentation Slides of Security Summit 2019 HK 

Identify Vulnerabilities That Matters Based On The Risks Before Hackers Find Them

The security industry has gotten really good at identifying vulnerabilities. That's the good news. The bad news is that now we have to fix them! Given the sheer volume of vulnerabilities, assigning risk levels or even CVSS simply isn't prescriptive enough. Vulnerability ranking was born from this universal problem. Known vulnerabilities that exist in our networks, whether found by manual penetration testing or vulnerability scanning tools, represent a real risk and bring additional audit concerns. Using a combination of open source intelligence, attacker methodology and remediation support, X-Force Red is able to drive real progress on the post-discovery front to ensure that vulnerabilities are dealt with according to real risk.

To download the presentation slides, please fill in the information on the right.

For the video replay and more information, please visit our event webpage or contact us at 2825-7936.

Presentation Slides of Security Summit 2019 HK 

Identify Vulnerabilities That Matters Based On The Risks Before Hackers Find Them

The security industry has gotten really good at identifying vulnerabilities. That's the good news. The bad news is that now we have to fix them! Given the sheer volume of vulnerabilities, assigning risk levels or even CVSS simply isn't prescriptive enough. Vulnerability ranking was born from this universal problem. Known vulnerabilities that exist in our networks, whether found by manual penetration testing or vulnerability scanning tools, represent a real risk and bring additional audit concerns. Using a combination of open source intelligence, attacker methodology and remediation support, X-Force Red is able to drive real progress on the post-discovery front to ensure that vulnerabilities are dealt with according to real risk.

To download the presentation slides, please fill in the information on the right.

For the video replay and more information, please visit our event webpage or contact us at 2825-7936.

Already have an IBM account? Log in
Business contact information

1. Contact information

Phone
Open menu
We use phone in order to reach you for account related matters or, with your permission, to contact you related to other products and services.

2. Additional information