SlideShare a Scribd company logo
1 of 18
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Exploitation at
Scale: EPSS and
Beyond
AI in Vulnerability Management and the SOC
Michael Roytman, Distinguished Engineer, AI/ML
October 2023, Rome, Italy
Published CVEs
2000 2005 2010 2015 2020
Annually
published
CVEs
Remediation capacity
Companies are closing about 15%
of their vulnerabilities every month
(typical is 5%-20%).
1K 10
K
100K 1M 10M 100M
Average monthly observed vulnerabilities
Average
monthly
closed
vulnerabilities
100
1K
10K
100K
1M
10M
10
The 1% that matters
1.2% of CVEs have published
and observed exploits
0.6% of CVEs just have
executed exploits in the
wild
21.2% of CVEs just have
an exploit publicly released
Source: Kenna/Cyentia
77% of CVEs have no
published or observed exploit
Positive predictive value of remediating a
vulnerability with property X
0
Breach probability (%)
0 5 10 15 20 25 30 35
CVSS 10
EDB
MSP
EDB+MSP
Variable importance (SHAP)
Top 30 contributing variables, scores represent a mean absolute contribution
EPSS: Variable importance
0.00 0.05 0.10 0.15 0.20
Tag: code execution
Exploit: Exploit DB
CVE: Count of References
Vendor: Microsoft
Exploit: Metasploit
Tag: Remote
CVSS: 3.1/PR:N
Exploit: Github
CVE: Age of CVE
Tag: SQLi
CVSS: 3.1/Scored
CVSS: 3.1/AV;N
Tag: XSS
Vendor: Adobe
CVSS: 3.1/AV.L
Tag: Denial of Service
Vendor: Apache
CVSS: 3.1/UI:N
Tag: Command Injection
Vendor: HP
Vendor: Apple
Tag: Local
Scanner: jaeles
Tag: Crafted Web
CVSS: 3.1/PR:L
CVSS: 3.1/CH
Vendor: ISC
Tag: Memory Corruption
Tag: Web
Vendor: Cat
What is your VM program’s coverage?
Coverage:
Of the known
exploits/exploitations
out there, how many
does your strategy
remediate?
Remediation coverage and efficiency metrics across firms
110 Kenna Customers 75-80% coverage
0% 25% 50% 75% 100%
Coverage
Efficiency
0%
20%
40%
60%
How efficient is your VM program?
Efficiency:
You fixed
10 vulnerabilities.
What percentage of
those are ones that
actually pose the
risk to your
organization?
Remediation coverage and efficiency metrics across firms
110 Kenna Customers
0% 25% 50% 75% 100%
Coverage
Efficiency
0%
20%
40%
60% 40% are
efficient choices
Remediation rate
3 mos 6 mos 9 mos 1 year
Time from discovery
Percentage
of
vulnerabilities
remediated 0%
20%
40%
60%
80%
45% of vulnerabilities are
remediated in the first month
Almost two thirds of vulnerabilities are
remediated in the first three months
Just under 20% of vulnerabilities
are still open after a year
100%
Remediation by category of asset
3 mos 6 mos 9 mos 1 year 1 year
3 mos
1 year
6 mos
1 year
9 mos
Time (months)
Probability
of
vulnerability
remediation
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
50%
369
254
70
36
63%
84%
86%
Mac OS X
Microsoft platforms
Linux/Unix
Appliances/devices
Remediation on Microsoft platforms
3 mos 6 mos 9 mos 1 year 1 year
3 mos
1 year
6 mos
1 year
9 mos
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
Probability
of
vulnerability
remediation
Time (months)
2003 Server
2008 Server
Windows Vista
Windows 8.1
2012 Server
Windows 7
Windows 2000
Windows XP
2016 Server
Windows 10
Newly
unsupported
Supported Unsupported
“High-risk” capacity
Average monthly change in high-risk vulnerabilities
20%
increase
10% 0% 10% 20%
decrease
Proportion
of
firms
16% of orgs
are maintaining
33% of orgs
are falling behind
51% of orgs
are reducing their
high-risk
vulnerabilities
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Findings signal to noise
P(Incident|Finding)
• Kenna Risk Meter Score
• EPSS (www.first.org/epss)
The goal of Infosec is to prevent breaches
ESG study:
• 38% of orgs had trouble filtering
noisy alerts
• 37% had trouble accommodating
security telemetry volumes
• 34% struggle to building a useful
data stream/pipeline
Most incidents don’t matter
• Computer data breach: 76% of
incidents had no loss, 97.5% < $440K
• Ransomware: 90% of incidents had
no loss, 98.3% < $300K
• Business email compromise:
42% had no loss
76% of incidents
had no loss.
Dots represent the
remaining 24%.
CDB n=2,781
$148
$1,274
$29,774
$438,499
$1,594,648
Loss by incident type.
Each dot represents 0.5% of incidents.
90% of incidents
had no loss.
Dots represent the
remaining 10%.
Ransomware
n=2,475
Dollars $1 $1,000 $1,000,000
$69
$500
$11,150
$296,500
$1,155,775
Distribution of breach losses on a log scale
1,250
1,000
750
500
250
0
Number
of
events
$10M $20M $30M $40M
There are 188 events with losses over $10M
that are impossible to see in this view
All this whitespace has a purpose. Plotting losses on a
linear scale like this causes minor events to drown out
the rare major events that are a key concern to risk managers
and enterprise directors. Don’t lose the forest for the trees!
Events with less than $1M loss
dominate this naïve view.
Distribution of breach losses on a linear scale (truncated at $50M)
Total Losses
The losses of over $10m are
now much more visible
By viewing breach losses on a log scale,
a clear pattern emerges that makes
statistical modelling much easier.
Density
$100 $1K $10K $10M $100M $1B $10B
$100K $1M
Total Losses
Distribution of cyber event losses on a log scale
Total Losses
$100 $1K $10K $100K $1M $10M $100M $1B $10B
Median loss: $196k
Events with losses over $20m
8% of all losses are in this region
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

More Related Content

Similar to CyberTechEurope.pptx

Security breaches and costs outstrip growth in spending
Security breaches and costs outstrip growth in spendingSecurity breaches and costs outstrip growth in spending
Security breaches and costs outstrip growth in spending
Don More
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
resultsig
 
State of the Cloud 2023—The AI era
State of the Cloud 2023—The AI eraState of the Cloud 2023—The AI era
State of the Cloud 2023—The AI era
Bessemer Venture Partners
 
Citibank
CitibankCitibank
Citibank
bpost
 
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
Mitchell Grooms
 

Similar to CyberTechEurope.pptx (20)

Security breaches and costs outstrip growth in spending
Security breaches and costs outstrip growth in spendingSecurity breaches and costs outstrip growth in spending
Security breaches and costs outstrip growth in spending
 
Project Risk Assessment PowerPoint Presentation Slides
Project Risk Assessment PowerPoint Presentation SlidesProject Risk Assessment PowerPoint Presentation Slides
Project Risk Assessment PowerPoint Presentation Slides
 
F041123639
F041123639F041123639
F041123639
 
Credit risk scoring model final
Credit risk scoring model finalCredit risk scoring model final
Credit risk scoring model final
 
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
 
CSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho Presentation
 
The CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market ReviewThe CyberScope - Q2 2015 Market Review
The CyberScope - Q2 2015 Market Review
 
Quantifying Cyber Risk
Quantifying Cyber Risk Quantifying Cyber Risk
Quantifying Cyber Risk
 
Project Risk Assessment Powerpoint Presentation Slides
Project Risk Assessment Powerpoint Presentation SlidesProject Risk Assessment Powerpoint Presentation Slides
Project Risk Assessment Powerpoint Presentation Slides
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Top 11 public saa s companies covid risks in 2020
Top 11 public saa s companies covid risks in 2020Top 11 public saa s companies covid risks in 2020
Top 11 public saa s companies covid risks in 2020
 
Cybersecurity Risk Quantification
Cybersecurity Risk QuantificationCybersecurity Risk Quantification
Cybersecurity Risk Quantification
 
State of the Cloud 2023
State of the Cloud 2023State of the Cloud 2023
State of the Cloud 2023
 
State of the Cloud 2023—The AI era
State of the Cloud 2023—The AI eraState of the Cloud 2023—The AI era
State of the Cloud 2023—The AI era
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
Tax-Integrated Risk Management of Municipal Bonds
Tax-Integrated Risk Management of Municipal BondsTax-Integrated Risk Management of Municipal Bonds
Tax-Integrated Risk Management of Municipal Bonds
 
Progressive Times - May 2012
Progressive Times - May 2012Progressive Times - May 2012
Progressive Times - May 2012
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Citibank
CitibankCitibank
Citibank
 
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
BDQCRM Cyber Risk Management Intelligence Top 12 Final 080216
 

More from Michael Roytman

Measure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done RightMeasure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done Right
Michael Roytman
 

More from Michael Roytman (15)

O'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalO'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability Final
 
RSA 2017 - Predicting Exploitability - With Predictions
RSA 2017 - Predicting Exploitability - With PredictionsRSA 2017 - Predicting Exploitability - With Predictions
RSA 2017 - Predicting Exploitability - With Predictions
 
Predicting Exploitability
Predicting ExploitabilityPredicting Exploitability
Predicting Exploitability
 
Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016
 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Attacker Behavior Boston Security Conference 2015
Attacker Behavior Boston Security Conference 2015Attacker Behavior Boston Security Conference 2015
Attacker Behavior Boston Security Conference 2015
 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data Science
 
Fix What Matters: BSidesDetroit 2014
Fix What Matters: BSidesDetroit 2014Fix What Matters: BSidesDetroit 2014
Fix What Matters: BSidesDetroit 2014
 
Risk IO Webisode 1: The Breach Landscape
Risk IO Webisode 1: The Breach LandscapeRisk IO Webisode 1: The Breach Landscape
Risk IO Webisode 1: The Breach Landscape
 
A Heartbleed By Any Other Name - Data Driven Vulnerability Management
A Heartbleed By Any Other Name - Data Driven Vulnerability ManagementA Heartbleed By Any Other Name - Data Driven Vulnerability Management
A Heartbleed By Any Other Name - Data Driven Vulnerability Management
 
Measure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done RightMeasure What You FIx: Asset Risk Management Done Right
Measure What You FIx: Asset Risk Management Done Right
 
Less is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OLess is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/O
 
BsidesSF 2014 Fix What Matters
BsidesSF 2014 Fix What MattersBsidesSF 2014 Fix What Matters
BsidesSF 2014 Fix What Matters
 
Fix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability ManagementFix What Matters: A Data Driven Approach to Vulnerability Management
Fix What Matters: A Data Driven Approach to Vulnerability Management
 

Recently uploaded

Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
amitlee9823
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
JoseMangaJr1
 

Recently uploaded (20)

BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 

CyberTechEurope.pptx

  • 1. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Exploitation at Scale: EPSS and Beyond AI in Vulnerability Management and the SOC Michael Roytman, Distinguished Engineer, AI/ML October 2023, Rome, Italy
  • 2. Published CVEs 2000 2005 2010 2015 2020 Annually published CVEs
  • 3. Remediation capacity Companies are closing about 15% of their vulnerabilities every month (typical is 5%-20%). 1K 10 K 100K 1M 10M 100M Average monthly observed vulnerabilities Average monthly closed vulnerabilities 100 1K 10K 100K 1M 10M 10
  • 4. The 1% that matters 1.2% of CVEs have published and observed exploits 0.6% of CVEs just have executed exploits in the wild 21.2% of CVEs just have an exploit publicly released Source: Kenna/Cyentia 77% of CVEs have no published or observed exploit
  • 5. Positive predictive value of remediating a vulnerability with property X 0 Breach probability (%) 0 5 10 15 20 25 30 35 CVSS 10 EDB MSP EDB+MSP
  • 6. Variable importance (SHAP) Top 30 contributing variables, scores represent a mean absolute contribution EPSS: Variable importance 0.00 0.05 0.10 0.15 0.20 Tag: code execution Exploit: Exploit DB CVE: Count of References Vendor: Microsoft Exploit: Metasploit Tag: Remote CVSS: 3.1/PR:N Exploit: Github CVE: Age of CVE Tag: SQLi CVSS: 3.1/Scored CVSS: 3.1/AV;N Tag: XSS Vendor: Adobe CVSS: 3.1/AV.L Tag: Denial of Service Vendor: Apache CVSS: 3.1/UI:N Tag: Command Injection Vendor: HP Vendor: Apple Tag: Local Scanner: jaeles Tag: Crafted Web CVSS: 3.1/PR:L CVSS: 3.1/CH Vendor: ISC Tag: Memory Corruption Tag: Web Vendor: Cat
  • 7. What is your VM program’s coverage? Coverage: Of the known exploits/exploitations out there, how many does your strategy remediate? Remediation coverage and efficiency metrics across firms 110 Kenna Customers 75-80% coverage 0% 25% 50% 75% 100% Coverage Efficiency 0% 20% 40% 60%
  • 8. How efficient is your VM program? Efficiency: You fixed 10 vulnerabilities. What percentage of those are ones that actually pose the risk to your organization? Remediation coverage and efficiency metrics across firms 110 Kenna Customers 0% 25% 50% 75% 100% Coverage Efficiency 0% 20% 40% 60% 40% are efficient choices
  • 9. Remediation rate 3 mos 6 mos 9 mos 1 year Time from discovery Percentage of vulnerabilities remediated 0% 20% 40% 60% 80% 45% of vulnerabilities are remediated in the first month Almost two thirds of vulnerabilities are remediated in the first three months Just under 20% of vulnerabilities are still open after a year 100%
  • 10. Remediation by category of asset 3 mos 6 mos 9 mos 1 year 1 year 3 mos 1 year 6 mos 1 year 9 mos Time (months) Probability of vulnerability remediation 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 50% 369 254 70 36 63% 84% 86% Mac OS X Microsoft platforms Linux/Unix Appliances/devices
  • 11. Remediation on Microsoft platforms 3 mos 6 mos 9 mos 1 year 1 year 3 mos 1 year 6 mos 1 year 9 mos 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Probability of vulnerability remediation Time (months) 2003 Server 2008 Server Windows Vista Windows 8.1 2012 Server Windows 7 Windows 2000 Windows XP 2016 Server Windows 10 Newly unsupported Supported Unsupported
  • 12. “High-risk” capacity Average monthly change in high-risk vulnerabilities 20% increase 10% 0% 10% 20% decrease Proportion of firms 16% of orgs are maintaining 33% of orgs are falling behind 51% of orgs are reducing their high-risk vulnerabilities
  • 13. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Findings signal to noise P(Incident|Finding) • Kenna Risk Meter Score • EPSS (www.first.org/epss)
  • 14. The goal of Infosec is to prevent breaches ESG study: • 38% of orgs had trouble filtering noisy alerts • 37% had trouble accommodating security telemetry volumes • 34% struggle to building a useful data stream/pipeline
  • 15. Most incidents don’t matter • Computer data breach: 76% of incidents had no loss, 97.5% < $440K • Ransomware: 90% of incidents had no loss, 98.3% < $300K • Business email compromise: 42% had no loss 76% of incidents had no loss. Dots represent the remaining 24%. CDB n=2,781 $148 $1,274 $29,774 $438,499 $1,594,648 Loss by incident type. Each dot represents 0.5% of incidents. 90% of incidents had no loss. Dots represent the remaining 10%. Ransomware n=2,475 Dollars $1 $1,000 $1,000,000 $69 $500 $11,150 $296,500 $1,155,775
  • 16. Distribution of breach losses on a log scale 1,250 1,000 750 500 250 0 Number of events $10M $20M $30M $40M There are 188 events with losses over $10M that are impossible to see in this view All this whitespace has a purpose. Plotting losses on a linear scale like this causes minor events to drown out the rare major events that are a key concern to risk managers and enterprise directors. Don’t lose the forest for the trees! Events with less than $1M loss dominate this naïve view. Distribution of breach losses on a linear scale (truncated at $50M) Total Losses The losses of over $10m are now much more visible By viewing breach losses on a log scale, a clear pattern emerges that makes statistical modelling much easier. Density $100 $1K $10K $10M $100M $1B $10B $100K $1M Total Losses
  • 17. Distribution of cyber event losses on a log scale Total Losses $100 $1K $10K $100K $1M $10M $100M $1B $10B Median loss: $196k Events with losses over $20m 8% of all losses are in this region
  • 18. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Editor's Notes

  1. Michael
  2. Ed
  3. Ed
  4. Ed
  5. Michael
  6. Michael
  7. Ed If I fixed 2 vulnerabilities this year and both of them were really important, then I'm 100% efficient. But I fixed 2 vulnerabilities for an enterprise that has 3 million vulnerabilities, I haven’t actually made a dent in my overall risk. Coverage: “Of the known exploits and exploitations that are out there, how many does your strategy remediate?” It's really easy to have 100% coverage. You just remediate every vulnerability. Really expensive, very inefficient. There's a trade-off between efficiency and coverage. You want to remain as efficient as possible while increasing your coverage. Most of customers (Global 2000) are around the 70-80% mark and then some of the smaller customers are out here. Note: 70-80% of risk reduction is really hard to achieve. This is the traditional VM problem: A bunch of noise coming in, and you have to figure out an efficient strategy that gets you to the risk tolerance that you want. Objective of RBVM: Cover as much at the most efficient cost.
  8. Ed About the visual: Benchmarking study feat. 110 Kenna customers; measured efficiency and coverage of their VM programs Efficiency: “If you remediate some subset of vulnerabilities, what percentage of those are ones that actually pose the risk to your organization (had an exploit or a successful exploitation)?” 40% of the vulnerabilities that they fix are efficient choices, or vulnerabilities that do actually pose a risk to their organization. Raise your efficiency from 40% to 60%, then you've saved 20% of the time spent on assessment, remediation, working with IT teams, etc. Note: 40% as an average is pretty high. CVSS usually puts folks around the 20- 22% mark.
  9. Ed
  10. These are the individual survival curves for vulnerabilities on the four categories of assets. Compare the half-lives (50% closed) and/or the percentage remediated at one year.
  11. Note the dotted lines are end-of-life’d and the dashed are newly unsupported (as of Jan 2020 when we gathered our data). Clearly older systems lift the remediation curve for Microsoft and newer (supported) systems are remediating much faster.
  12. Ed
  13. Michael
  14. Michael
  15. Michael
  16. Michael
  17. Michael