SlideShare a Scribd company logo
1 of 11
Download to read offline
Does a Hybrid Model for
Vulnerability Management
Make Sense
Does a Hybrrid Model for Vulnerability Management Make Sense? 1
A new model for Vulnerability Management (VM) – the Hybrid
Model – layer on top of the emerging scanning tools. And on the
surface it appears to be going backwards – why would we
retreat from the advances and sheer scale that automated
scanning technology can deliver and burden ourselves with the
slow pace of a team of humans? Does the hybrid model make
sense?
Do Automated Scanning Tools
Require a Human Touch?
Will Scanning Automation Delivery
Vulnerability Management Nirvana?
If there has been one theme in 2021 to define the last decade of
Vulnerability Management (VM) - it is the rise of automated tools
to deal with the deluge of the ever-increasing number of attack
surfaces and the frequency and ingenuity of the attacks
themselves. And so as the tools become more refined and more
accurate and expanded in scope to handle all the layers of the
attack surface including not only the network but the application
layer itself – one might reasonably ask - Are we now in 2021
headed to a utopian state? Are we headed to a point where the
technology and its ability to handle the sheer volume of
incidents is simply going to outgun the attackers?
Software testing Software, who thought that
would ever work?
Does a Hybrid Model for Vulnerability
Management make Sense?
2
So while detection automation looks after the incident scale issue – it passes on a new scaling problem – dealing with the
noise.
“More than 60% of security professionals estimate their security function spend over 3 hours per day validating false-positives.
Nearly 30% are spending over 6 hours on this task. Most agree that it is too much and the time could be better utilized. For
most, it is the part of their job they like least.”
by Infosecurity Europe 2019
Does a Hybrrid Model for Vulnerability Management Make Sense?
Software testing software - We accept false positives in
scanners (Software getting it wrong) but we don't accept
vulnerabilities (Software getting it wrong).
The view from the Trenches is
Not Pretty - Its Actually Noisy
The answer is a firm “No”. For those on the front line tasked with managing incidents, their day-to-day is not close to
utopian – if it was to be described with one word, it would be– Noise.
Far from VM nirvana – the front line VM staff leveraging automated scanning tools are now faced with a new herculean
task. For all the scaling efficiencies automated tools, they have effectively created a new massive problem – How with the
proliferation of automated alerts do the tools actually separate the wheat from the chaff? For a significant amount of
the alerts represent false positives (noise) – an alert that accurately detects an incident but the incident does not
represent an actual issue.
3
What is Smart VM?
The Morphing Attack Surface
All of us are impressed with emerging smart tech with
driverless cars. But imagine the challenge if the road itself is
every-changing. This is precisely the challenge with attack
surface management. You cannot effectively manage what
you do not know. As new systems are deployed,
decommissioned or a system changes, changes to firewalls
occur, and exposed services and rogue deployments are
introduced – each one of these events provides continuously
evolving avenues of attack for any enterprise.
The Ever Growing World of API’s
Again like the attack surface, unidentified and unmanaged
API’s can lead to blind spots. And API's are becoming ever
more popular given the explosive growth in mobile apps and
the financial technology (FinTech) sector. Each API exposure
can represent a unique attack vector into the enterprise’s
systems. And their shapes and forms can be quite varied -
including but not limited to SOAP/XML, RESTful and other
Web Services.
The Knowing Eye – Flying Blind is Not
Smart
The requirement is simple. To be smart, your VM approach
needs to provide you the ability to see all services exposed to
the public internet across your global estate. And this is not
easy. Especially with API detection and scanning – the
technology for the API use case is not as mature or focused
as general attack surface vulnerability scanning. Smart API
assessments also assess logical controls associated with the
API - items such as authorization, request flooding, parameter
manipulation and attribute injection can be assessed to help
establish a strong security posture.
Adaptive Smartness
And so on the question of smartness applied to Vulnerability
Management – here we have a case of super smartness. For
an effective Smart VM solution will continuously scan and
intelligently discover and assess both the perpetually
changing attack surface and API. Adaption is smart.
Identifying the
ever-evolving
Attack Surface
is the first step
to Smart VM
Smart VM
Six Significant Approaches
Smart Ongoing Attack Surface Management and API Discovery.
1
3
Hybrid to the Rescue - Can I have
some Human Expertise Please?
Does a Hybrrid Model for Vulnerability Management Make Sense?
The reliance alone on automation to defend against an
experienced and determined human adversary will not work.
Imagine yet another future utopian state. We rank all the types of incidents against technical and business severity and
pass them through a skilled, experienced set of cyber security experts that parse out severity-ranked alerts of those that
represent a significant problem from those that are false positives. And imagine that communication comes with expert
remediation advice to resolve the issue efficiently and how to avoid the issue in the future. Now in this scenario, the
front-line VM worker is equipped with scale for both incident detection through automation tools and immediate
resolution guidance against only those incidents that matter. Indeed, such a desirable state is in fact available in 2021 – it’s
the hybrid approach.
The Future is Now - What are we waiting For?
So if the enterprise now can embrace a truly hybrid model – a model that both leverages the scale of automated detection
tools against the entire stack as well as integrated human security expert guidance to rule out all the false positives and
provide timely expert remediation guidance for equally timely resolution – then surely the enterprise is 100% onboard –
correct?
The answer is “no” and for the remainder of this paper, we will examine why and submit the approach to a pro and con
analysis - weighing the merits and areas of concern for adopting the hybrid approach and then counter whether those areas
of concerns are valid.
4
Does a Hybrrid Model for Vulnerability Management Make Sense?
Pro’s
1. Scale
Hybrid model still offers all the scaling automation
benefits of the automated side of hybrid.
2. Accuracy
The entire point of the human expertise side of the
hybrid model is to verify incidents and remove false
positives.
3. Expert Support
Again expert is exactly what the human side of the
hybrid model delivers needs to cover everything –
testing both the technical and logical security posture
of every asset – including API’s, cloud-based
infrastructure and web and mobile applications.
4. Removing Noise
The human touch will remove 100% of false positives.
5. Timely Remediation
When experts present real incidents they offer expert
guidance how to resolve now and for the future. And
no time wasted or distraction from chasing false
positives.
Pro’s and Con’s for
the Hybrid Model
"Scale vs Depth – Scanners do scale,
Humans “do” depth.
– Our enemies "do" depth every
time and are focused."
Automation accuracy is not
a strong as human accuracy
– Our attackers are humans.
IT and developers are not
cyber security experts
– Expert guidance is necessary
Chasing noise is a fool’s errand
Far from slowing remediation
– relevant expertise pins down
the source of the problem quicker
4
Does a Hybrrid Model for Vulnerability Management Make Sense?
Pro’s
6. Severity Ranked Guidance
The human side gets rid of the false positives and the
automated scanning platform can be mapped in the
setup phase to automatically rank the severity
appropriately for each enterprise.
7. Staffing Challenges
Having a team of security experts within a hybrid
model offloads the stress of inhouse recruitment.
8. Automate Remediation into
Operational Workflow
The alerts can be integrated to the enterprise support
and development systems to automate remediation
practices into the daily operational workflow.
Pro’s and Con’s for
the Hybrid Model
Effective VM intelligence
requires alert significance context
Extending your security team with
world class experts offloads
staffing challenges
Change gives rise to Risk.
Change occurs when a system does
not change & When a system
changes (duh!!)
5
What is Smart VM?
One Dashboard of Smartness
Returning to our smart home analogy – a table covered with
smart controller devices or a smart mobile device littered
with smart applications for every layer of home
management gets less and less smart as the point
solutions proliferate. To go on vacation and have to
individually put each device for each application in vacation
mode is dumb. And yet when we look at most enterprise’s
Vulnerabitliy Management approach to dealing with each
layer of the stack - network, application, API, mobile, IoT –
we find the industry proliferated with individual point
solutions.
Can We Just Not Combine Point
Solutions?
Well, if one has separate point solutions then yes, one will
have to manually combine them to attempt to achieve a
composite view of the truth. But one cannot resist pointing
out that such an inefficient approach necessitates time,
budget and re-engineering to tie disparate systems and
reporting and analytics to one dashboard. The smarter
question to ask is – Why would you do that? Or put
differently – Why would you not just use an integrated full
stack solution to begin with?
An Integrated Full Stack View is a Smart
View
VM with blind spots is not smart. Smart VM assesses
vulnerability across the entire stack. Just as the hacker
themselves welcomes any weakness on any layer – they are
quite liberal in this respect – so too should the Smart VM
solution address any issue in any of the layers.
Detecting Correlations Between Layer
Incidents is Smart
And even if you manually attempted to tie insights from
each tool dedicated to each layer, there are correlations of
incident detection between layers that you may miss. And
these correlations are precisely what a single, integrated full
stack solution would detect.
Smart Security Layer Integration
3
Smart VM
Six Significant Approaches
A single,
integrated
full stack
solution
is key to
Smart VM.
5
Does a Hybrrid Model for Vulnerability Management Make Sense?
Pro’s
9. Instilling Confidence on Alerts and
Remediation
When a significant amount of alerts from just the
automated side of the hybrid model are presented with
no human filter, then there is a large expectation built that
they are acting on noise – false positives. When the noise
is removed with expert human review, then the enterprise
confidently knows they are acting on things that matter.
10. Enabling the Enterprise to Act
Strategically
Equipped with verified accurate intelligence, the
Enterprise Security Team can now plan and strategically
align their goals with the overall business goals of the
Enterprise.
11. Staff Morale
Removes the drudgery – the multiple hours per day – of
the repetitive work of removing false positives.
12. Executive Management Confidence
and Transparency
Acting on false positives or simply inaccurate
assessments can be tiresome to the Cyber Security Staff
and can be equally tiresome and demoralizing when the
executive management team does not think they are
being presented with the truth.
Pro’s and Con’s for
the Hybrid Model
Over time critical vulnerabilities are discovered.
Patches are released. Yesterday
I was secure, today I’ve a
Critical Risk. Need to patch/Redeploy.
Also....when a system changes:
New features deployed, new services exposed,
larger attack surface, more exposed,
more to attack, more headaches t
his also gives risk to risk.
Business Goal Alignment –
How to ensure Cyber Security
has a seat at the strategy table.
Burnout can have an
impact on readiness.
Nothing motivates more than
accurate and actionable intelligence.
5
What is Smart VM?
One Dashboard of Smartness
Returning to our smart home analogy – a table covered with
smart controller devices or a smart mobile device littered
with smart applications for every layer of home
management gets less and less smart as the point
solutions proliferate. To go on vacation and have to
individually put each device for each application in vacation
mode is dumb. And yet when we look at most enterprise’s
Vulnerabitliy Management approach to dealing with each
layer of the stack - network, application, API, mobile, IoT –
we find the industry proliferated with individual point
solutions.
Can We Just Not Combine Point
Solutions?
Well, if one has separate point solutions then yes, one will
have to manually combine them to attempt to achieve a
composite view of the truth. But one cannot resist pointing
out that such an inefficient approach necessitates time,
budget and re-engineering to tie disparate systems and
reporting and analytics to one dashboard. The smarter
question to ask is – Why would you do that? Or put
differently – Why would you not just use an integrated full
stack solution to begin with?
An Integrated Full Stack View is a Smart
View
VM with blind spots is not smart. Smart VM assesses
vulnerability across the entire stack. Just as the hacker
themselves welcomes any weakness on any layer – they are
quite liberal in this respect – so too should the Smart VM
solution address any issue in any of the layers.
Detecting Correlations Between Layer
Incidents is Smart
And even if you manually attempted to tie insights from
each tool dedicated to each layer, there are correlations of
incident detection between layers that you may miss. And
these correlations are precisely what a single, integrated full
stack solution would detect.
Smart Security Layer Integration
3
Smart VM
Six Significant Approaches
A single,
integrated
full stack
solution
is key to
Smart VM.
5
Does a Hybrrid Model for Vulnerability Management Make Sense?
Pro’s
13. Proactively educate IT Staff on what
is the issue and what can be done
The expert remediation guidance that comes from the
human touch side of the hybrid model can also be
proactive and suggest steps to be taken to avoid similar
issues in the future.
14. Supplements the Inherent Weakness
of Automation
Automation does not provide human context for
intelligence. Experts can identify risk. Artificial
intelligence is narrow – it cannot determine meaning.
15. Determination of Vulnerability
Significance
n order to be seen as significant, certain vulnerabilities
require humans to quickly come to terms with its
meaning. It is not just all about ruling out false positives
– it’s also coming to terms at the human interpretation
level that a certain issue represents a significant issue.
Pro’s and Con’s for
the Hybrid Model
The DevSecOps elephant
in the room is "Validation”
We’re protecting our systems against
breach by humans, not scanners right!!
We can’t improvewhatwe can’t measure;
We can’t securewhatwe can’t see.
6
What is Smart VM?
Context Matters
Traditional automated scanning solutions will provide incident alerts. They will provide a lot of them. But without knowing
their context – what order of priorty both on the business and technical side they should be placed in – then it is a
challenge to say the least, how one should respond and with what urgency. And chasing every incident as if it has a Level 1
risk association tied to it, is simply not sustainable.
Installing Smart Intelligence - Its All About the Setup
A Smart VM solution will be built so that in the onboarding phase, vulnerabilities can be classified to reflect both the
technical and business risk they represent. So instead of trying to determine potential risk, the alerts with a Smart VM
solution will present themselves in context so that significant incidents can be dealt with in a timely and relevant way and
conversely, incidents that do not represent significant risk can be handled appropriately.
But Every Business is Different
They certainly are. Put simply a game streaming company will have different concerns than a Financial Service company.
And that’s why with a Smart VM solution, there is the built-in capability to rank incident type against the specific technical
and business risk for that business. And then there is built-in automation to automate security and attack surface alerts
with contextualized business and technical priority rankings.
All Incidents are Not Created Equal
Web application Risk Density is typically vastly higher than non-web application assets. It is important that your Smart VM
solution can provide you an accurate assessment of the risk density of every threat. Smart VM means you can quickly
determine between critical, high, medium and low risk. Context drives everything.
Smart VM
Six Significant Approaches
Smart Intelligence
4
Not all alerts
are created equal.
Smart VM provides
context.
6
Does a Hybrrid Model for Vulnerability Management Make Sense?
Cons’s
Pro’s and Con’s for
the Hybrid Model
1. Time
Having a human interpretation phase will slow down the ETA on resolution
Counter
This step will ALWAYS have to happen whether one utilizes a hybrid external solution or uses their own staff to
rule out false positives. And the hybrid model can make effective use of a correlation engine to effectively
minimize the human effort.
2. Cost
A managed service offering expert (i.e. costly) world-class security engineers within their hybrid model surely would be
cost prohibitive.
Counter
The Enterprise HAS to deal with that cost themselves regardless if they staff it or use an external hybrid
solution. The external hybrid solution can leverage economies of scale, produce efficiencies with its VM focus
and have staff overlap in duties to lower the overall cost.
3. Resourcing
The enterprise even with their well-heeled brands has recruiting challenges for cyber security expertise, surely smaller
suppliers will have the same problem.
Counter
With its global VM focus, the external hybrid solution will have more efficient recruiting and relevant ongoing
staffing support while carrying less overheard. The best and brightest like to work with the team that is the best
and brightest.
4. Scaling
And as incidents rise there must be a point where the human side cannot meet the scale need - even with an external
provider.
Counter
is a well-know problem which experts in the community label – “resolution” – and the hybrid model is
continually stress-tested to handle the scale of incidents that full automation can capture and still offer the
exact same accuracy small volumes. This is partly due to the hybrid solution provider staffing correctly and also
due to internal efficiencies created including a correlation engine that aids the expert team coming to terms
with the significance of the issue quickly. And then to point out the obvious - an Enterprise’s own Cyber Security
staff only using point automated scanning tools will have the same problem. The hybrid model does not create
the problem of scale – it just deals with it the most effectively.
7
What is Smart VM?
Smart VM
puts insight into
the hands of
operations.
Smart Remediation Integration
The Smartest of VM solutions will be effectively rendered useless if the insight and practical remediation guidance is not
integrated into the daily operational support systems and workflow. The challenge is that typical risk, software
development and ticketing systems were not built to capture output from a VM solution.
From Insight to Action
The smart approach is to automate VM intelligence and remediation guidance into daily operational workflow systems. So
risk managers, software development managers and operational support staff can readily see within their systems, the
vulnerability issues as they arise and are presented with tactical guidance on how to resolve them.
A Wide Integration
So what type of systems are we speaking of here? – in short, all of them. Notifications can be sent through Webhooks/API
integrations, Ticketing systems, Instant Messaging, Risk Platforms, Bug Tracking, Asset Management and SIEM systems.
Some of the typical brand names are Webhooks, Risksense, Jira, Axionus, YARO, Zapier, Microsoft Teams, and Slack.
Being Proactive is Smart
And with automated integration between remediation and operational support in place, this means that expert guidance
can not only provide timely instructions for incidents as they happen they can also point to patterns and preventative ways
to avoid issues in the future.
Smart VM
Six Significant Approaches
Smart Operations
5
6
What is Smart VM?
Context Matters
Traditional automated scanning solutions will provide incident alerts. They will provide a lot of them. But without knowing
their context – what order of priorty both on the business and technical side they should be placed in – then it is a
challenge to say the least, how one should respond and with what urgency. And chasing every incident as if it has a Level 1
risk association tied to it, is simply not sustainable.
Installing Smart Intelligence - Its All About the Setup
A Smart VM solution will be built so that in the onboarding phase, vulnerabilities can be classified to reflect both the
technical and business risk they represent. So instead of trying to determine potential risk, the alerts with a Smart VM
solution will present themselves in context so that significant incidents can be dealt with in a timely and relevant way and
conversely, incidents that do not represent significant risk can be handled appropriately.
But Every Business is Different
They certainly are. Put simply a game streaming company will have different concerns than a Financial Service company.
And that’s why with a Smart VM solution, there is the built-in capability to rank incident type against the specific technical
and business risk for that business. And then there is built-in automation to automate security and attack surface alerts
with contextualized business and technical priority rankings.
All Incidents are Not Created Equal
Web application Risk Density is typically vastly higher than non-web application assets. It is important that your Smart VM
solution can provide you an accurate assessment of the risk density of every threat. Smart VM means you can quickly
determine between critical, high, medium and low risk. Context drives everything.
Smart VM
Six Significant Approaches
Smart Intelligence
4
Not all alerts
are created equal.
Smart VM provides
context.
7
Does a Hybrrid Model for Vulnerability Management Make Sense?
Cons’s
5. External experts do not possess company-specific nuanced business knowledge
Surely an external managed service cannot know the nuances like my own staff?
Counter
While the concern in understandable – it really reflects a lack of knowledge of what is on offer with a hybrid
model. For a hybrid model has the capability to recognize which type of assets and related incidents are most
important to an organization and map that priority ranking in the setup phase into the automated alert systems.
So not only do all alerts and recommendations out of a hybrid model remove all the false positives – all the real
issues are presented prioritized to what matters to that organization.
6. Widening the Gap Between Ops and External Recommendations
Does not using an external team of experts within the hybrid model widen the operational gap between VM staff expertise
and the operational daily workflow.
Counter
While the Cyber Security internal department may be physically down the hall from the IT and Ops staff, the
method to integrate recommendations against discovered concerns is typically quite manual and slow and
burdensome and inefficient. With a hybrid model – all the alerts and expert remediation are integrated very
quickly in the setup phase to all the relevant operational support, risk and development systems. And on top of
integrating automated recommendation into the day-to-day daily operational workflow, the guidance itself one
receives is from a team of specialized cyber security experts.
Pro’s and Con’s for
the Hybrid Model
Does a Hybrrid Model for Vulnerability Management Make Sense? 8
The merits now have been shown to be numerous and significant And the areas of potential concerns have been identified
but as each one was countered - none of them have been shown to have merit. And so perhaps the question now is not
whether the hybrid model makes sense – its makes buckets of sense. But rather - it is so compelling for so many reasons
that any enterprise considering what model represents the most compelling solution for Vulnerability Management must
put the Hybrid Model at the top of their list.
So Does the Hybrid Model
Make Sense?
In Conclusion - The Hybrid Model Makes Buckets of Sense
“While automation certainly provides scale,
its human expertise that accurately gauges
significance and focused remediation where
it really matters”

More Related Content

Similar to Does a Hybrid model for vulnerability Management Make Sense.pdf

Agile Mobility Solutions
Agile Mobility Solutions Agile Mobility Solutions
Agile Mobility Solutions Agileblaze
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Chris Ross
 
Why Manual Pen-Testing is a must have for comprehensive application security ...
Why Manual Pen-Testing is a must have for comprehensive application security ...Why Manual Pen-Testing is a must have for comprehensive application security ...
Why Manual Pen-Testing is a must have for comprehensive application security ...IndusfacePvtLtd
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in aiSrajalTiwari1
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYvenkatvajradhar1
 
One login enemy at the gates
One login enemy at the gatesOne login enemy at the gates
One login enemy at the gatesEoin Keary
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Dinis Cruz
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyMobile Labs
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2ShivamSharma909
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfMobibizIndia1
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfSabhanayagham Thirugnanasambandam
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 

Similar to Does a Hybrid model for vulnerability Management Make Sense.pdf (20)

Agile Mobility Solutions
Agile Mobility Solutions Agile Mobility Solutions
Agile Mobility Solutions
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
 
Why Manual Pen-Testing is a must have for comprehensive application security ...
Why Manual Pen-Testing is a must have for comprehensive application security ...Why Manual Pen-Testing is a must have for comprehensive application security ...
Why Manual Pen-Testing is a must have for comprehensive application security ...
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
One login enemy at the gates
One login enemy at the gatesOne login enemy at the gates
One login enemy at the gates
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 

More from Eoin Keary

IISF-March2023.pptx
IISF-March2023.pptxIISF-March2023.pptx
IISF-March2023.pptxEoin Keary
 
Validation of vulnerabilities.pdf
Validation of vulnerabilities.pdfValidation of vulnerabilities.pdf
Validation of vulnerabilities.pdfEoin Keary
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEoin Keary
 
Edgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEdgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEoin Keary
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
edgescan vulnerability stats report (2018)
 edgescan vulnerability stats report (2018)  edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2018) Eoin Keary
 
edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) Eoin Keary
 
Full stack vulnerability management at scale
Full stack vulnerability management at scaleFull stack vulnerability management at scale
Full stack vulnerability management at scaleEoin Keary
 
Vulnerability Intelligence - Standing Still in a world full of change
Vulnerability Intelligence - Standing Still in a world full of changeVulnerability Intelligence - Standing Still in a world full of change
Vulnerability Intelligence - Standing Still in a world full of changeEoin Keary
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019Eoin Keary
 
Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Eoin Keary
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelEoin Keary
 
Keeping the wolf from 1000 doors.
Keeping the wolf from 1000 doors.Keeping the wolf from 1000 doors.
Keeping the wolf from 1000 doors.Eoin Keary
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbersEoin Keary
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud versionEoin Keary
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersEoin Keary
 
Ebu class edgescan-2017
Ebu class edgescan-2017Ebu class edgescan-2017
Ebu class edgescan-2017Eoin Keary
 
Vulnerability management and threat detection by the numbers
Vulnerability management and threat detection by the numbersVulnerability management and threat detection by the numbers
Vulnerability management and threat detection by the numbersEoin Keary
 
14. html 5 security considerations
14. html 5 security considerations14. html 5 security considerations
14. html 5 security considerationsEoin Keary
 
04. xss and encoding
04.  xss and encoding04.  xss and encoding
04. xss and encodingEoin Keary
 

More from Eoin Keary (20)

IISF-March2023.pptx
IISF-March2023.pptxIISF-March2023.pptx
IISF-March2023.pptx
 
Validation of vulnerabilities.pdf
Validation of vulnerabilities.pdfValidation of vulnerabilities.pdf
Validation of vulnerabilities.pdf
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics Report
 
Edgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats ReportEdgescan 2021 Vulnerability Stats Report
Edgescan 2021 Vulnerability Stats Report
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
edgescan vulnerability stats report (2018)
 edgescan vulnerability stats report (2018)  edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2018)
 
edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019)
 
Full stack vulnerability management at scale
Full stack vulnerability management at scaleFull stack vulnerability management at scale
Full stack vulnerability management at scale
 
Vulnerability Intelligence - Standing Still in a world full of change
Vulnerability Intelligence - Standing Still in a world full of changeVulnerability Intelligence - Standing Still in a world full of change
Vulnerability Intelligence - Standing Still in a world full of change
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
 
Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat Model
 
Keeping the wolf from 1000 doors.
Keeping the wolf from 1000 doors.Keeping the wolf from 1000 doors.
Keeping the wolf from 1000 doors.
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbers
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Ebu class edgescan-2017
Ebu class edgescan-2017Ebu class edgescan-2017
Ebu class edgescan-2017
 
Vulnerability management and threat detection by the numbers
Vulnerability management and threat detection by the numbersVulnerability management and threat detection by the numbers
Vulnerability management and threat detection by the numbers
 
14. html 5 security considerations
14. html 5 security considerations14. html 5 security considerations
14. html 5 security considerations
 
04. xss and encoding
04.  xss and encoding04.  xss and encoding
04. xss and encoding
 

Recently uploaded

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (11)

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Does a Hybrid model for vulnerability Management Make Sense.pdf

  • 1. Does a Hybrid Model for Vulnerability Management Make Sense
  • 2. Does a Hybrrid Model for Vulnerability Management Make Sense? 1 A new model for Vulnerability Management (VM) – the Hybrid Model – layer on top of the emerging scanning tools. And on the surface it appears to be going backwards – why would we retreat from the advances and sheer scale that automated scanning technology can deliver and burden ourselves with the slow pace of a team of humans? Does the hybrid model make sense? Do Automated Scanning Tools Require a Human Touch? Will Scanning Automation Delivery Vulnerability Management Nirvana? If there has been one theme in 2021 to define the last decade of Vulnerability Management (VM) - it is the rise of automated tools to deal with the deluge of the ever-increasing number of attack surfaces and the frequency and ingenuity of the attacks themselves. And so as the tools become more refined and more accurate and expanded in scope to handle all the layers of the attack surface including not only the network but the application layer itself – one might reasonably ask - Are we now in 2021 headed to a utopian state? Are we headed to a point where the technology and its ability to handle the sheer volume of incidents is simply going to outgun the attackers? Software testing Software, who thought that would ever work? Does a Hybrid Model for Vulnerability Management make Sense?
  • 3. 2 So while detection automation looks after the incident scale issue – it passes on a new scaling problem – dealing with the noise. “More than 60% of security professionals estimate their security function spend over 3 hours per day validating false-positives. Nearly 30% are spending over 6 hours on this task. Most agree that it is too much and the time could be better utilized. For most, it is the part of their job they like least.” by Infosecurity Europe 2019 Does a Hybrrid Model for Vulnerability Management Make Sense? Software testing software - We accept false positives in scanners (Software getting it wrong) but we don't accept vulnerabilities (Software getting it wrong). The view from the Trenches is Not Pretty - Its Actually Noisy The answer is a firm “No”. For those on the front line tasked with managing incidents, their day-to-day is not close to utopian – if it was to be described with one word, it would be– Noise. Far from VM nirvana – the front line VM staff leveraging automated scanning tools are now faced with a new herculean task. For all the scaling efficiencies automated tools, they have effectively created a new massive problem – How with the proliferation of automated alerts do the tools actually separate the wheat from the chaff? For a significant amount of the alerts represent false positives (noise) – an alert that accurately detects an incident but the incident does not represent an actual issue.
  • 4. 3 What is Smart VM? The Morphing Attack Surface All of us are impressed with emerging smart tech with driverless cars. But imagine the challenge if the road itself is every-changing. This is precisely the challenge with attack surface management. You cannot effectively manage what you do not know. As new systems are deployed, decommissioned or a system changes, changes to firewalls occur, and exposed services and rogue deployments are introduced – each one of these events provides continuously evolving avenues of attack for any enterprise. The Ever Growing World of API’s Again like the attack surface, unidentified and unmanaged API’s can lead to blind spots. And API's are becoming ever more popular given the explosive growth in mobile apps and the financial technology (FinTech) sector. Each API exposure can represent a unique attack vector into the enterprise’s systems. And their shapes and forms can be quite varied - including but not limited to SOAP/XML, RESTful and other Web Services. The Knowing Eye – Flying Blind is Not Smart The requirement is simple. To be smart, your VM approach needs to provide you the ability to see all services exposed to the public internet across your global estate. And this is not easy. Especially with API detection and scanning – the technology for the API use case is not as mature or focused as general attack surface vulnerability scanning. Smart API assessments also assess logical controls associated with the API - items such as authorization, request flooding, parameter manipulation and attribute injection can be assessed to help establish a strong security posture. Adaptive Smartness And so on the question of smartness applied to Vulnerability Management – here we have a case of super smartness. For an effective Smart VM solution will continuously scan and intelligently discover and assess both the perpetually changing attack surface and API. Adaption is smart. Identifying the ever-evolving Attack Surface is the first step to Smart VM Smart VM Six Significant Approaches Smart Ongoing Attack Surface Management and API Discovery. 1 3 Hybrid to the Rescue - Can I have some Human Expertise Please? Does a Hybrrid Model for Vulnerability Management Make Sense? The reliance alone on automation to defend against an experienced and determined human adversary will not work. Imagine yet another future utopian state. We rank all the types of incidents against technical and business severity and pass them through a skilled, experienced set of cyber security experts that parse out severity-ranked alerts of those that represent a significant problem from those that are false positives. And imagine that communication comes with expert remediation advice to resolve the issue efficiently and how to avoid the issue in the future. Now in this scenario, the front-line VM worker is equipped with scale for both incident detection through automation tools and immediate resolution guidance against only those incidents that matter. Indeed, such a desirable state is in fact available in 2021 – it’s the hybrid approach. The Future is Now - What are we waiting For? So if the enterprise now can embrace a truly hybrid model – a model that both leverages the scale of automated detection tools against the entire stack as well as integrated human security expert guidance to rule out all the false positives and provide timely expert remediation guidance for equally timely resolution – then surely the enterprise is 100% onboard – correct? The answer is “no” and for the remainder of this paper, we will examine why and submit the approach to a pro and con analysis - weighing the merits and areas of concern for adopting the hybrid approach and then counter whether those areas of concerns are valid.
  • 5. 4 Does a Hybrrid Model for Vulnerability Management Make Sense? Pro’s 1. Scale Hybrid model still offers all the scaling automation benefits of the automated side of hybrid. 2. Accuracy The entire point of the human expertise side of the hybrid model is to verify incidents and remove false positives. 3. Expert Support Again expert is exactly what the human side of the hybrid model delivers needs to cover everything – testing both the technical and logical security posture of every asset – including API’s, cloud-based infrastructure and web and mobile applications. 4. Removing Noise The human touch will remove 100% of false positives. 5. Timely Remediation When experts present real incidents they offer expert guidance how to resolve now and for the future. And no time wasted or distraction from chasing false positives. Pro’s and Con’s for the Hybrid Model "Scale vs Depth – Scanners do scale, Humans “do” depth. – Our enemies "do" depth every time and are focused." Automation accuracy is not a strong as human accuracy – Our attackers are humans. IT and developers are not cyber security experts – Expert guidance is necessary Chasing noise is a fool’s errand Far from slowing remediation – relevant expertise pins down the source of the problem quicker
  • 6. 4 Does a Hybrrid Model for Vulnerability Management Make Sense? Pro’s 6. Severity Ranked Guidance The human side gets rid of the false positives and the automated scanning platform can be mapped in the setup phase to automatically rank the severity appropriately for each enterprise. 7. Staffing Challenges Having a team of security experts within a hybrid model offloads the stress of inhouse recruitment. 8. Automate Remediation into Operational Workflow The alerts can be integrated to the enterprise support and development systems to automate remediation practices into the daily operational workflow. Pro’s and Con’s for the Hybrid Model Effective VM intelligence requires alert significance context Extending your security team with world class experts offloads staffing challenges Change gives rise to Risk. Change occurs when a system does not change & When a system changes (duh!!)
  • 7. 5 What is Smart VM? One Dashboard of Smartness Returning to our smart home analogy – a table covered with smart controller devices or a smart mobile device littered with smart applications for every layer of home management gets less and less smart as the point solutions proliferate. To go on vacation and have to individually put each device for each application in vacation mode is dumb. And yet when we look at most enterprise’s Vulnerabitliy Management approach to dealing with each layer of the stack - network, application, API, mobile, IoT – we find the industry proliferated with individual point solutions. Can We Just Not Combine Point Solutions? Well, if one has separate point solutions then yes, one will have to manually combine them to attempt to achieve a composite view of the truth. But one cannot resist pointing out that such an inefficient approach necessitates time, budget and re-engineering to tie disparate systems and reporting and analytics to one dashboard. The smarter question to ask is – Why would you do that? Or put differently – Why would you not just use an integrated full stack solution to begin with? An Integrated Full Stack View is a Smart View VM with blind spots is not smart. Smart VM assesses vulnerability across the entire stack. Just as the hacker themselves welcomes any weakness on any layer – they are quite liberal in this respect – so too should the Smart VM solution address any issue in any of the layers. Detecting Correlations Between Layer Incidents is Smart And even if you manually attempted to tie insights from each tool dedicated to each layer, there are correlations of incident detection between layers that you may miss. And these correlations are precisely what a single, integrated full stack solution would detect. Smart Security Layer Integration 3 Smart VM Six Significant Approaches A single, integrated full stack solution is key to Smart VM. 5 Does a Hybrrid Model for Vulnerability Management Make Sense? Pro’s 9. Instilling Confidence on Alerts and Remediation When a significant amount of alerts from just the automated side of the hybrid model are presented with no human filter, then there is a large expectation built that they are acting on noise – false positives. When the noise is removed with expert human review, then the enterprise confidently knows they are acting on things that matter. 10. Enabling the Enterprise to Act Strategically Equipped with verified accurate intelligence, the Enterprise Security Team can now plan and strategically align their goals with the overall business goals of the Enterprise. 11. Staff Morale Removes the drudgery – the multiple hours per day – of the repetitive work of removing false positives. 12. Executive Management Confidence and Transparency Acting on false positives or simply inaccurate assessments can be tiresome to the Cyber Security Staff and can be equally tiresome and demoralizing when the executive management team does not think they are being presented with the truth. Pro’s and Con’s for the Hybrid Model Over time critical vulnerabilities are discovered. Patches are released. Yesterday I was secure, today I’ve a Critical Risk. Need to patch/Redeploy. Also....when a system changes: New features deployed, new services exposed, larger attack surface, more exposed, more to attack, more headaches t his also gives risk to risk. Business Goal Alignment – How to ensure Cyber Security has a seat at the strategy table. Burnout can have an impact on readiness. Nothing motivates more than accurate and actionable intelligence.
  • 8. 5 What is Smart VM? One Dashboard of Smartness Returning to our smart home analogy – a table covered with smart controller devices or a smart mobile device littered with smart applications for every layer of home management gets less and less smart as the point solutions proliferate. To go on vacation and have to individually put each device for each application in vacation mode is dumb. And yet when we look at most enterprise’s Vulnerabitliy Management approach to dealing with each layer of the stack - network, application, API, mobile, IoT – we find the industry proliferated with individual point solutions. Can We Just Not Combine Point Solutions? Well, if one has separate point solutions then yes, one will have to manually combine them to attempt to achieve a composite view of the truth. But one cannot resist pointing out that such an inefficient approach necessitates time, budget and re-engineering to tie disparate systems and reporting and analytics to one dashboard. The smarter question to ask is – Why would you do that? Or put differently – Why would you not just use an integrated full stack solution to begin with? An Integrated Full Stack View is a Smart View VM with blind spots is not smart. Smart VM assesses vulnerability across the entire stack. Just as the hacker themselves welcomes any weakness on any layer – they are quite liberal in this respect – so too should the Smart VM solution address any issue in any of the layers. Detecting Correlations Between Layer Incidents is Smart And even if you manually attempted to tie insights from each tool dedicated to each layer, there are correlations of incident detection between layers that you may miss. And these correlations are precisely what a single, integrated full stack solution would detect. Smart Security Layer Integration 3 Smart VM Six Significant Approaches A single, integrated full stack solution is key to Smart VM. 5 Does a Hybrrid Model for Vulnerability Management Make Sense? Pro’s 13. Proactively educate IT Staff on what is the issue and what can be done The expert remediation guidance that comes from the human touch side of the hybrid model can also be proactive and suggest steps to be taken to avoid similar issues in the future. 14. Supplements the Inherent Weakness of Automation Automation does not provide human context for intelligence. Experts can identify risk. Artificial intelligence is narrow – it cannot determine meaning. 15. Determination of Vulnerability Significance n order to be seen as significant, certain vulnerabilities require humans to quickly come to terms with its meaning. It is not just all about ruling out false positives – it’s also coming to terms at the human interpretation level that a certain issue represents a significant issue. Pro’s and Con’s for the Hybrid Model The DevSecOps elephant in the room is "Validation” We’re protecting our systems against breach by humans, not scanners right!! We can’t improvewhatwe can’t measure; We can’t securewhatwe can’t see.
  • 9. 6 What is Smart VM? Context Matters Traditional automated scanning solutions will provide incident alerts. They will provide a lot of them. But without knowing their context – what order of priorty both on the business and technical side they should be placed in – then it is a challenge to say the least, how one should respond and with what urgency. And chasing every incident as if it has a Level 1 risk association tied to it, is simply not sustainable. Installing Smart Intelligence - Its All About the Setup A Smart VM solution will be built so that in the onboarding phase, vulnerabilities can be classified to reflect both the technical and business risk they represent. So instead of trying to determine potential risk, the alerts with a Smart VM solution will present themselves in context so that significant incidents can be dealt with in a timely and relevant way and conversely, incidents that do not represent significant risk can be handled appropriately. But Every Business is Different They certainly are. Put simply a game streaming company will have different concerns than a Financial Service company. And that’s why with a Smart VM solution, there is the built-in capability to rank incident type against the specific technical and business risk for that business. And then there is built-in automation to automate security and attack surface alerts with contextualized business and technical priority rankings. All Incidents are Not Created Equal Web application Risk Density is typically vastly higher than non-web application assets. It is important that your Smart VM solution can provide you an accurate assessment of the risk density of every threat. Smart VM means you can quickly determine between critical, high, medium and low risk. Context drives everything. Smart VM Six Significant Approaches Smart Intelligence 4 Not all alerts are created equal. Smart VM provides context. 6 Does a Hybrrid Model for Vulnerability Management Make Sense? Cons’s Pro’s and Con’s for the Hybrid Model 1. Time Having a human interpretation phase will slow down the ETA on resolution Counter This step will ALWAYS have to happen whether one utilizes a hybrid external solution or uses their own staff to rule out false positives. And the hybrid model can make effective use of a correlation engine to effectively minimize the human effort. 2. Cost A managed service offering expert (i.e. costly) world-class security engineers within their hybrid model surely would be cost prohibitive. Counter The Enterprise HAS to deal with that cost themselves regardless if they staff it or use an external hybrid solution. The external hybrid solution can leverage economies of scale, produce efficiencies with its VM focus and have staff overlap in duties to lower the overall cost. 3. Resourcing The enterprise even with their well-heeled brands has recruiting challenges for cyber security expertise, surely smaller suppliers will have the same problem. Counter With its global VM focus, the external hybrid solution will have more efficient recruiting and relevant ongoing staffing support while carrying less overheard. The best and brightest like to work with the team that is the best and brightest. 4. Scaling And as incidents rise there must be a point where the human side cannot meet the scale need - even with an external provider. Counter is a well-know problem which experts in the community label – “resolution” – and the hybrid model is continually stress-tested to handle the scale of incidents that full automation can capture and still offer the exact same accuracy small volumes. This is partly due to the hybrid solution provider staffing correctly and also due to internal efficiencies created including a correlation engine that aids the expert team coming to terms with the significance of the issue quickly. And then to point out the obvious - an Enterprise’s own Cyber Security staff only using point automated scanning tools will have the same problem. The hybrid model does not create the problem of scale – it just deals with it the most effectively.
  • 10. 7 What is Smart VM? Smart VM puts insight into the hands of operations. Smart Remediation Integration The Smartest of VM solutions will be effectively rendered useless if the insight and practical remediation guidance is not integrated into the daily operational support systems and workflow. The challenge is that typical risk, software development and ticketing systems were not built to capture output from a VM solution. From Insight to Action The smart approach is to automate VM intelligence and remediation guidance into daily operational workflow systems. So risk managers, software development managers and operational support staff can readily see within their systems, the vulnerability issues as they arise and are presented with tactical guidance on how to resolve them. A Wide Integration So what type of systems are we speaking of here? – in short, all of them. Notifications can be sent through Webhooks/API integrations, Ticketing systems, Instant Messaging, Risk Platforms, Bug Tracking, Asset Management and SIEM systems. Some of the typical brand names are Webhooks, Risksense, Jira, Axionus, YARO, Zapier, Microsoft Teams, and Slack. Being Proactive is Smart And with automated integration between remediation and operational support in place, this means that expert guidance can not only provide timely instructions for incidents as they happen they can also point to patterns and preventative ways to avoid issues in the future. Smart VM Six Significant Approaches Smart Operations 5 6 What is Smart VM? Context Matters Traditional automated scanning solutions will provide incident alerts. They will provide a lot of them. But without knowing their context – what order of priorty both on the business and technical side they should be placed in – then it is a challenge to say the least, how one should respond and with what urgency. And chasing every incident as if it has a Level 1 risk association tied to it, is simply not sustainable. Installing Smart Intelligence - Its All About the Setup A Smart VM solution will be built so that in the onboarding phase, vulnerabilities can be classified to reflect both the technical and business risk they represent. So instead of trying to determine potential risk, the alerts with a Smart VM solution will present themselves in context so that significant incidents can be dealt with in a timely and relevant way and conversely, incidents that do not represent significant risk can be handled appropriately. But Every Business is Different They certainly are. Put simply a game streaming company will have different concerns than a Financial Service company. And that’s why with a Smart VM solution, there is the built-in capability to rank incident type against the specific technical and business risk for that business. And then there is built-in automation to automate security and attack surface alerts with contextualized business and technical priority rankings. All Incidents are Not Created Equal Web application Risk Density is typically vastly higher than non-web application assets. It is important that your Smart VM solution can provide you an accurate assessment of the risk density of every threat. Smart VM means you can quickly determine between critical, high, medium and low risk. Context drives everything. Smart VM Six Significant Approaches Smart Intelligence 4 Not all alerts are created equal. Smart VM provides context. 7 Does a Hybrrid Model for Vulnerability Management Make Sense? Cons’s 5. External experts do not possess company-specific nuanced business knowledge Surely an external managed service cannot know the nuances like my own staff? Counter While the concern in understandable – it really reflects a lack of knowledge of what is on offer with a hybrid model. For a hybrid model has the capability to recognize which type of assets and related incidents are most important to an organization and map that priority ranking in the setup phase into the automated alert systems. So not only do all alerts and recommendations out of a hybrid model remove all the false positives – all the real issues are presented prioritized to what matters to that organization. 6. Widening the Gap Between Ops and External Recommendations Does not using an external team of experts within the hybrid model widen the operational gap between VM staff expertise and the operational daily workflow. Counter While the Cyber Security internal department may be physically down the hall from the IT and Ops staff, the method to integrate recommendations against discovered concerns is typically quite manual and slow and burdensome and inefficient. With a hybrid model – all the alerts and expert remediation are integrated very quickly in the setup phase to all the relevant operational support, risk and development systems. And on top of integrating automated recommendation into the day-to-day daily operational workflow, the guidance itself one receives is from a team of specialized cyber security experts. Pro’s and Con’s for the Hybrid Model
  • 11. Does a Hybrrid Model for Vulnerability Management Make Sense? 8 The merits now have been shown to be numerous and significant And the areas of potential concerns have been identified but as each one was countered - none of them have been shown to have merit. And so perhaps the question now is not whether the hybrid model makes sense – its makes buckets of sense. But rather - it is so compelling for so many reasons that any enterprise considering what model represents the most compelling solution for Vulnerability Management must put the Hybrid Model at the top of their list. So Does the Hybrid Model Make Sense? In Conclusion - The Hybrid Model Makes Buckets of Sense “While automation certainly provides scale, its human expertise that accurately gauges significance and focused remediation where it really matters”