Kenna & VMware Carbon Black Collaborate  
Learn More >
Contact Us
Talk to an Expert
Request a demo

Asset Risk In 3 Short Videos (and 1 Long One)

Jul 2, 2020
Kenna Security

Share with Your Network

When you examine vulnerabilities and try to derive patterns and lessons learned, it becomes clear that risk management is not just about the vulns. It is, in fact, very much about the assets. In our fifth installment of Prioritization to Prediction (a research series conducted with our partners at the Cyentia Institute), we share some of the patterns and lessons that emerge when you view risk-based vulnerability management from an asset perspective.

We also got busy explaining some of those insights in a series of videos that highlight key takeaways from this research. Here are a few short videos that offer a high-level look, followed by a comprehensive overview. All 22 minutes of it. 

Why asset risk is so important 

The typical organization manages vulnerabilities across 800 active assets,
but 10% manage over 35,000 assets.
– Prioritization to Prediction, Volume 5: In Search of Assets At Risk

Shifting focus from vulnerability-centric risk to asset-centric risk helps teams better understand and manage risk within their environment. Here’s Kenna’s own CTO and Co-Founder Ed Bellis on why managing risk is all about determining which assets (or group of assets) are at risk and the likelihood of those assets being targeted.

Asset risk informs remediation tactics

What does a review of vulnerabilities on an asset or group of assets tell you? Well, Wade Baker, Co-Founder and Partner of the Cyentia Institute, reveals how the P2P, Volume 5 findings might make you rethink the way you approach remediation.

Wade dives deeper into the idea of comparing the researched characteristics of vulnerabilities on systems or assets–and how doing this can help CISOs determine the strengths and weaknesses of each system, and what that means for their environment.

Want even more detail? 

Share with Your Network

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms. Download the research report to learn more about the key findings: Common asset platforms and their typical risk profiles…

DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is just as critical to IT as it is to Security and DevOps.  And it’s worth getting right: Vulnerabilities can leave your most strategic assets—and your business itself—exposed to cyber threats…

DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You can learn more about the Exploit Prediction Scoring System and use the interactive calculator here: https://www.kennaresearch.com/tools/e…

READ MORE
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.