Build your risk-based vulnerability program
Contact Us
Talk to an Expert
Request a demo

The Life and Times of a Vulnerability and What It Means For You

The Life and Times of a Vulnerability and What It Means For You

Vulnerability management is all about time. 

  • How long does it take to find, prioritize and remediate vulnerabilities? 
  • How long until our adversaries discover and exploit these weaknesses? 
  • Who owns the momentum between defenders and attackers and what influences that dynamic? 

The sixth volume of the Prioritization to Prediction series produced in partnership with the Cyentia Institute, we look at the lifecycle of vulnerabilities and answer these questions. We tracked over 500 vulnerabilities that were known to be exploited in the wild from initial discovery, through publication and exploitation, ending with remediation. Discover how the sequence of events unfolds and the role that vendors and researchers play in the real world. 

Join Ed Bellis, Kenna Security Co-founder and CTO and Jay Jacobs, Cyentia Institute Co-founder and Chief Data Scientist, for

  • A deep dive into the eye-opening data 
  • What the lifecycle of a vulnerability means for IT and Security teams
  • How vendors and researchers influence the impact of a vulnerability

Earn one CPE credit through ISC² by viewing this on-demand webinar.

Share with Your Network


© 2021 Kenna Security. All Rights Reserved. Privacy Policy.