Skip to content

Commit

Permalink
Merge pull request #2706 from OpenSecuritySummit/adams9777-patch-126
Browse files Browse the repository at this point in the history
Update DATA-Driven-approach-on-vulnerabilities-Appsec-vs-Infra.md
  • Loading branch information
adams9777 authored Oct 13, 2023
2 parents ec225b3 + 8bba027 commit 6ca96ca
Showing 1 changed file with 14 additions and 8 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ when_year : 2023
when_month : Oct
when_day : Fri
when_time : WS-17-18
hey_summit : https://us06web.zoom.us/meeting/register/tZclf-qprzIoH9V84Td6Tz77XiYPlxGmr7vv
hey_summit : https://www.linkedin.com/events/datadrivenapproachonvulnerabili7118644187322888194/
session_slack:
#status : draft
description :
Expand All @@ -28,10 +28,16 @@ zoom_link : https://us06web.zoom.us/meeting/register/tZclf-qprzIoH9V84Td6Tz77
---

## About this session
Risk and the focusing on what matters
- Vulnerability complexity
- Risk and the psychological effect of influencing stakeholders
- the difference in vulnerabilities
- reachability
- exploitability
- deployment and contextual risk
Navigating through the pulsating neural networks of cybersecurity, this session brings to the fore a meticulously crafted exploration into a DATA-Driven Approach towards understanding and mitigating vulnerabilities in both AppSec and Infrastructural security spheres.

Vulnerabilities are more than mere code anomalies; they are the conduits that can potentially unchain a cascade of unwanted cyber events. In this awe-inspiring panel, join a squadron of cybersecurity mavens who will steer you through an introspective journey deep into the core of vulnerability complexity, reachability, exploitability, and the dense fog of contextual risk.

## 🚀 Key Takeaways:

Unveiling Complexity: Dissecting vulnerabilities to comprehend their intrinsic and extrinsic complexity.
Psychology of Risk: Unmasking the psychological underpinning that influences stakeholders and drives critical security decisions.
Diverse Vulnerabilities: Traversing the variegated landscape of vulnerabilities, exploring their diverse nature, and approaching mitigation with perspicacity.
Dimension of Risk: Engaging in a riveting discourse on deployment amidst diverse risks, and tactfully managing them in the volatile cyberspace.
The session promulgates an enriched discussion that intends to shift your perspective from merely dealing with vulnerabilities to strategically navigating through them, with a DATA-driven compass guiding the way. Whether you're an Application Security expert, an Infrastructure Security professional, or a cyber enthusiast keen to expand your knowledge horizons, this session promises a blend of expert insights, tangible takeaways, and a forward-looking perspective on dealing with vulnerabilities.

Prepare to launch into a session where data meets depth, and experts decode the enigmatic realms of vulnerabilities in Appsec and Infra. It's not just a session; it's an expedition into the future of secure, savvy, and strategic cybersecurity.

0 comments on commit 6ca96ca

Please sign in to comment.