際際滷shows by User: eoinkeary / http://www.slideshare.net/images/logo.gif 際際滷shows by User: eoinkeary / Tue, 08 Aug 2023 11:07:11 GMT 際際滷Share feed for 際際滷shows by User: eoinkeary IISF-March2023.pptx /slideshow/iisfmarch2023pptx/259725520 iisf-march2023-230808110711-29ada01d
The 2023 Vulnerability Stats report as delivered to the IISF. Covering: PTaaS, Pentesting, Vulnerabilty Managment, EPSS, CISA KEV, Risk, Attack Surface Management. Its based on delivering thousands of PTaaS and RBVM assessments throughout 2022. Why tools and traditional pentesting has failed.]]>

The 2023 Vulnerability Stats report as delivered to the IISF. Covering: PTaaS, Pentesting, Vulnerabilty Managment, EPSS, CISA KEV, Risk, Attack Surface Management. Its based on delivering thousands of PTaaS and RBVM assessments throughout 2022. Why tools and traditional pentesting has failed.]]>
Tue, 08 Aug 2023 11:07:11 GMT /slideshow/iisfmarch2023pptx/259725520 eoinkeary@slideshare.net(eoinkeary) IISF-March2023.pptx eoinkeary The 2023 Vulnerability Stats report as delivered to the IISF. Covering: PTaaS, Pentesting, Vulnerabilty Managment, EPSS, CISA KEV, Risk, Attack Surface Management. Its based on delivering thousands of PTaaS and RBVM assessments throughout 2022. Why tools and traditional pentesting has failed. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iisf-march2023-230808110711-29ada01d-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The 2023 Vulnerability Stats report as delivered to the IISF. Covering: PTaaS, Pentesting, Vulnerabilty Managment, EPSS, CISA KEV, Risk, Attack Surface Management. Its based on delivering thousands of PTaaS and RBVM assessments throughout 2022. Why tools and traditional pentesting has failed.
IISF-March2023.pptx from Eoin Keary
]]>
45 0 https://cdn.slidesharecdn.com/ss_thumbnails/iisf-march2023-230808110711-29ada01d-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Validation of vulnerabilities.pdf /slideshow/validation-of-vulnerabilitiespdf/255645043 validationofvulnerabilities-230201135237-4855292f
How to approach validation of vulnerbilities for scale penetration testing. DEpth, accuracy and scale are a triad of problems each requiring attention. Attackers and threat actors have more time and patieince to look for complex vulnerabilities. Automation reliance is not working and will not beat determined humans. ]]>

How to approach validation of vulnerbilities for scale penetration testing. DEpth, accuracy and scale are a triad of problems each requiring attention. Attackers and threat actors have more time and patieince to look for complex vulnerabilities. Automation reliance is not working and will not beat determined humans. ]]>
Wed, 01 Feb 2023 13:52:36 GMT /slideshow/validation-of-vulnerabilitiespdf/255645043 eoinkeary@slideshare.net(eoinkeary) Validation of vulnerabilities.pdf eoinkeary How to approach validation of vulnerbilities for scale penetration testing. DEpth, accuracy and scale are a triad of problems each requiring attention. Attackers and threat actors have more time and patieince to look for complex vulnerabilities. Automation reliance is not working and will not beat determined humans. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/validationofvulnerabilities-230201135237-4855292f-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to approach validation of vulnerbilities for scale penetration testing. DEpth, accuracy and scale are a triad of problems each requiring attention. Attackers and threat actors have more time and patieince to look for complex vulnerabilities. Automation reliance is not working and will not beat determined humans.
Validation of vulnerabilities.pdf from Eoin Keary
]]>
13 0 https://cdn.slidesharecdn.com/ss_thumbnails/validationofvulnerabilities-230201135237-4855292f-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Does a Hybrid model for vulnerability Management Make Sense.pdf /eoinkeary/does-a-hybrid-model-for-vulnerability-management-make-sensepdf doesahybridmodelforvulnerabilitymanagementmakesense-230201134648-639033e2
Combining automation for scale and human expertise for depth. Leveraging thousands of datapoints and cyber analytics to verify security vulnerabilities. Why automation alone does not work because our enemies are humans. Automation does not have the skills to exploit business logic risks. Context is queen when it comes to risk bases priortization.]]>

Combining automation for scale and human expertise for depth. Leveraging thousands of datapoints and cyber analytics to verify security vulnerabilities. Why automation alone does not work because our enemies are humans. Automation does not have the skills to exploit business logic risks. Context is queen when it comes to risk bases priortization.]]>
Wed, 01 Feb 2023 13:46:48 GMT /eoinkeary/does-a-hybrid-model-for-vulnerability-management-make-sensepdf eoinkeary@slideshare.net(eoinkeary) Does a Hybrid model for vulnerability Management Make Sense.pdf eoinkeary Combining automation for scale and human expertise for depth. Leveraging thousands of datapoints and cyber analytics to verify security vulnerabilities. Why automation alone does not work because our enemies are humans. Automation does not have the skills to exploit business logic risks. Context is queen when it comes to risk bases priortization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/doesahybridmodelforvulnerabilitymanagementmakesense-230201134648-639033e2-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Combining automation for scale and human expertise for depth. Leveraging thousands of datapoints and cyber analytics to verify security vulnerabilities. Why automation alone does not work because our enemies are humans. Automation does not have the skills to exploit business logic risks. Context is queen when it comes to risk bases priortization.
Does a Hybrid model for vulnerability Management Make Sense.pdf from Eoin Keary
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/doesahybridmodelforvulnerabilitymanagementmakesense-230201134648-639033e2-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Edgescan 2022 Vulnerability Statistics Report /slideshow/edgescan-2022-vulnerability-statistics-report/252041035 2022vulnerabilitystatisticreport-220622223108-40c56dcc
Vulnerability stats, full stack cyber issues. Vulnerability management, threat analysis and attack surface management. Exposures, MTTR and cyber risk management. Bested in the assessment of thousands of systems globally on a continuous basis. ]]>

Vulnerability stats, full stack cyber issues. Vulnerability management, threat analysis and attack surface management. Exposures, MTTR and cyber risk management. Bested in the assessment of thousands of systems globally on a continuous basis. ]]>
Wed, 22 Jun 2022 22:31:08 GMT /slideshow/edgescan-2022-vulnerability-statistics-report/252041035 eoinkeary@slideshare.net(eoinkeary) Edgescan 2022 Vulnerability Statistics Report eoinkeary Vulnerability stats, full stack cyber issues. Vulnerability management, threat analysis and attack surface management. Exposures, MTTR and cyber risk management. Bested in the assessment of thousands of systems globally on a continuous basis. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2022vulnerabilitystatisticreport-220622223108-40c56dcc-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Vulnerability stats, full stack cyber issues. Vulnerability management, threat analysis and attack surface management. Exposures, MTTR and cyber risk management. Bested in the assessment of thousands of systems globally on a continuous basis.
Edgescan 2022 Vulnerability Statistics Report from Eoin Keary
]]>
300 0 https://cdn.slidesharecdn.com/ss_thumbnails/2022vulnerabilitystatisticreport-220622223108-40c56dcc-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Edgescan 2021 Vulnerability Stats Report /slideshow/stats-report-2021-feb-presentation/243335001 statsreport2021-febpresentation-210224092122
A deck discussing the the findings from the Edgescan 2021 Vulnerability Stats Report. A full stack view of the vulnerabilities discovered in 2020 based on thousands of assessments. Host, network and application layer security metrics -Full stack]]>

A deck discussing the the findings from the Edgescan 2021 Vulnerability Stats Report. A full stack view of the vulnerabilities discovered in 2020 based on thousands of assessments. Host, network and application layer security metrics -Full stack]]>
Wed, 24 Feb 2021 09:21:22 GMT /slideshow/stats-report-2021-feb-presentation/243335001 eoinkeary@slideshare.net(eoinkeary) Edgescan 2021 Vulnerability Stats Report eoinkeary A deck discussing the the findings from the Edgescan 2021 Vulnerability Stats Report. A full stack view of the vulnerabilities discovered in 2020 based on thousands of assessments. Host, network and application layer security metrics -Full stack <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/statsreport2021-febpresentation-210224092122-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A deck discussing the the findings from the Edgescan 2021 Vulnerability Stats Report. A full stack view of the vulnerabilities discovered in 2020 based on thousands of assessments. Host, network and application layer security metrics -Full stack
Edgescan 2021 Vulnerability Stats Report from Eoin Keary
]]>
99 0 https://cdn.slidesharecdn.com/ss_thumbnails/statsreport2021-febpresentation-210224092122-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
One login enemy at the gates /slideshow/one-login-enemy-at-the-gates/242581058 onelogin-enemyatthegates-210211113952
Why hackers dont give a s*#t. Why the traditional penetration model is broken and how to fix it.]]>

Why hackers dont give a s*#t. Why the traditional penetration model is broken and how to fix it.]]>
Thu, 11 Feb 2021 11:39:52 GMT /slideshow/one-login-enemy-at-the-gates/242581058 eoinkeary@slideshare.net(eoinkeary) One login enemy at the gates eoinkeary Why hackers dont give a s*#t. Why the traditional penetration model is broken and how to fix it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/onelogin-enemyatthegates-210211113952-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Why hackers dont give a s*#t. Why the traditional penetration model is broken and how to fix it.
One login enemy at the gates from Eoin Keary
]]>
99 0 https://cdn.slidesharecdn.com/ss_thumbnails/onelogin-enemyatthegates-210211113952-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Edgescan vulnerability stats report 2020 /slideshow/edgescan-vulnerability-stats-report-2020/242581028 edgescanvulnerabilitystatsreport2020-210211113635
Vulnerability landscape for 2019 covering the most common cyber security risks based on thousands of full stack assessments.]]>

Vulnerability landscape for 2019 covering the most common cyber security risks based on thousands of full stack assessments.]]>
Thu, 11 Feb 2021 11:36:35 GMT /slideshow/edgescan-vulnerability-stats-report-2020/242581028 eoinkeary@slideshare.net(eoinkeary) Edgescan vulnerability stats report 2020 eoinkeary Vulnerability landscape for 2019 covering the most common cyber security risks based on thousands of full stack assessments. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/edgescanvulnerabilitystatsreport2020-210211113635-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Vulnerability landscape for 2019 covering the most common cyber security risks based on thousands of full stack assessments.
Edgescan vulnerability stats report 2020 from Eoin Keary
]]>
77 0 https://cdn.slidesharecdn.com/ss_thumbnails/edgescanvulnerabilitystatsreport2020-210211113635-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
edgescan vulnerability stats report (2018) /slideshow/edgescan-vulnerability-stats-report-2018/140871051 bcc007edgescanstatsreport2018web-final-190415140013
The 2018 Vulnerability Stats report covering off a fullstack review of cyber security across 1000's of web applictions, end-points and cloud based systems globally.]]>

The 2018 Vulnerability Stats report covering off a fullstack review of cyber security across 1000's of web applictions, end-points and cloud based systems globally.]]>
Mon, 15 Apr 2019 14:00:13 GMT /slideshow/edgescan-vulnerability-stats-report-2018/140871051 eoinkeary@slideshare.net(eoinkeary) edgescan vulnerability stats report (2018) eoinkeary The 2018 Vulnerability Stats report covering off a fullstack review of cyber security across 1000's of web applictions, end-points and cloud based systems globally. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bcc007edgescanstatsreport2018web-final-190415140013-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The 2018 Vulnerability Stats report covering off a fullstack review of cyber security across 1000&#39;s of web applictions, end-points and cloud based systems globally.
edgescan vulnerability stats report (2018) from Eoin Keary
]]>
167 1 https://cdn.slidesharecdn.com/ss_thumbnails/bcc007edgescanstatsreport2018web-final-190415140013-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
edgescan vulnerability stats report (2019) /slideshow/edgescan-vulnerability-stats-report-2019/140870022 bcc017edgescanstatsreport2019web-190415135346
The 2019 Stats report covering a fullstack vulnerability view based on 1000's of web application, end-point and cloud assessments globally,]]>

The 2019 Stats report covering a fullstack vulnerability view based on 1000's of web application, end-point and cloud assessments globally,]]>
Mon, 15 Apr 2019 13:53:46 GMT /slideshow/edgescan-vulnerability-stats-report-2019/140870022 eoinkeary@slideshare.net(eoinkeary) edgescan vulnerability stats report (2019) eoinkeary The 2019 Stats report covering a fullstack vulnerability view based on 1000's of web application, end-point and cloud assessments globally, <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bcc017edgescanstatsreport2019web-190415135346-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The 2019 Stats report covering a fullstack vulnerability view based on 1000&#39;s of web application, end-point and cloud assessments globally,
edgescan vulnerability stats report (2019) from Eoin Keary
]]>
121 1 https://cdn.slidesharecdn.com/ss_thumbnails/bcc017edgescanstatsreport2019web-190415135346-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Full stack vulnerability management at scale /slideshow/full-stack-vulnerability-management-at-scale/140868542 full-stackvulnerabilitymanagementatscalethefutureofsecurityassessment-190415134303
Infosecurity Europe Talk covering off all that is good bad and ugly about Vulnerability Management.]]>

Infosecurity Europe Talk covering off all that is good bad and ugly about Vulnerability Management.]]>
Mon, 15 Apr 2019 13:43:03 GMT /slideshow/full-stack-vulnerability-management-at-scale/140868542 eoinkeary@slideshare.net(eoinkeary) Full stack vulnerability management at scale eoinkeary Infosecurity Europe Talk covering off all that is good bad and ugly about Vulnerability Management. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/full-stackvulnerabilitymanagementatscalethefutureofsecurityassessment-190415134303-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Infosecurity Europe Talk covering off all that is good bad and ugly about Vulnerability Management.
Full stack vulnerability management at scale from Eoin Keary
]]>
186 2 https://cdn.slidesharecdn.com/ss_thumbnails/full-stackvulnerabilitymanagementatscalethefutureofsecurityassessment-190415134303-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vulnerability Intelligence - Standing Still in a world full of change /slideshow/vulnerability-intelligence-standing-still-in-a-world-full-of-change/140866132 edgescan-irish-ch-190415131920
Vulnerability Management Even when standing still the world changes around you. ]]>

Vulnerability Management Even when standing still the world changes around you. ]]>
Mon, 15 Apr 2019 13:19:20 GMT /slideshow/vulnerability-intelligence-standing-still-in-a-world-full-of-change/140866132 eoinkeary@slideshare.net(eoinkeary) Vulnerability Intelligence - Standing Still in a world full of change eoinkeary Vulnerability Management Even when standing still the world changes around you. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/edgescan-irish-ch-190415131920-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Vulnerability Management Even when standing still the world changes around you.
Vulnerability Intelligence - Standing Still in a world full of change from Eoin Keary
]]>
56 1 https://cdn.slidesharecdn.com/ss_thumbnails/edgescan-irish-ch-190415131920-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019 /slideshow/edgescan-vulnerability-stats-report-2019-hisac222019/131322706 edgescan-vulnerabilitystatsreport2019-h-isac-2-2-2019-190211113555
Preview of the 2019 edgescan Vulnerability Stats report delivered to H-ISAC in London Feb 2019]]>

Preview of the 2019 edgescan Vulnerability Stats report delivered to H-ISAC in London Feb 2019]]>
Mon, 11 Feb 2019 11:35:55 GMT /slideshow/edgescan-vulnerability-stats-report-2019-hisac222019/131322706 eoinkeary@slideshare.net(eoinkeary) Edgescan vulnerability stats report 2019 - h-isac-2-2-2019 eoinkeary Preview of the 2019 edgescan Vulnerability Stats report delivered to H-ISAC in London Feb 2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/edgescan-vulnerabilitystatsreport2019-h-isac-2-2-2019-190211113555-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Preview of the 2019 edgescan Vulnerability Stats report delivered to H-ISAC in London Feb 2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019 from Eoin Keary
]]>
198 3 https://cdn.slidesharecdn.com/ss_thumbnails/edgescan-vulnerabilitystatsreport2019-h-isac-2-2-2019-190211113555-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hide and seek - Attack Surface Management and continuous assessment. /slideshow/hide-and-seek-attack-surface-management-and-continuous-assessment/118878231 hideandseek-181009151903
Attack surface management and visibility is key to maintaining a robust cyber security posture. Continuous assessment, accuracy and scale are key to enterprise security. ]]>

Attack surface management and visibility is key to maintaining a robust cyber security posture. Continuous assessment, accuracy and scale are key to enterprise security. ]]>
Tue, 09 Oct 2018 15:19:03 GMT /slideshow/hide-and-seek-attack-surface-management-and-continuous-assessment/118878231 eoinkeary@slideshare.net(eoinkeary) Hide and seek - Attack Surface Management and continuous assessment. eoinkeary Attack surface management and visibility is key to maintaining a robust cyber security posture. Continuous assessment, accuracy and scale are key to enterprise security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hideandseek-181009151903-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Attack surface management and visibility is key to maintaining a robust cyber security posture. Continuous assessment, accuracy and scale are key to enterprise security.
Hide and seek - Attack Surface Management and continuous assessment. from Eoin Keary
]]>
171 1 https://cdn.slidesharecdn.com/ss_thumbnails/hideandseek-181009151903-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Online Gaming Cyber security and Threat Model /slideshow/online-gaming-cyber-security-and-threat-model/109689365 dublingamessummit-180813144915
Securing the Gaming ecosystem. How to secure global gaming deployments and the online game threat model.]]>

Securing the Gaming ecosystem. How to secure global gaming deployments and the online game threat model.]]>
Mon, 13 Aug 2018 14:49:15 GMT /slideshow/online-gaming-cyber-security-and-threat-model/109689365 eoinkeary@slideshare.net(eoinkeary) Online Gaming Cyber security and Threat Model eoinkeary Securing the Gaming ecosystem. How to secure global gaming deployments and the online game threat model. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dublingamessummit-180813144915-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Securing the Gaming ecosystem. How to secure global gaming deployments and the online game threat model.
Online Gaming Cyber security and Threat Model from Eoin Keary
]]>
892 5 https://cdn.slidesharecdn.com/ss_thumbnails/dublingamessummit-180813144915-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Keeping the wolf from 1000 doors. /eoinkeary/keeping-the-wolf-from-1000-doors semaformarch2018-edgescan-180320092110
Discussion on how to deliver vulnerability management at scale. Why Fullstack vulnerability management is important and silos of security are an issue. The pitfalls when delivering 1000's of assessments on a continuous basis. How edgescan delivers vulnerability intelligence.]]>

Discussion on how to deliver vulnerability management at scale. Why Fullstack vulnerability management is important and silos of security are an issue. The pitfalls when delivering 1000's of assessments on a continuous basis. How edgescan delivers vulnerability intelligence.]]>
Tue, 20 Mar 2018 09:21:10 GMT /eoinkeary/keeping-the-wolf-from-1000-doors eoinkeary@slideshare.net(eoinkeary) Keeping the wolf from 1000 doors. eoinkeary Discussion on how to deliver vulnerability management at scale. Why Fullstack vulnerability management is important and silos of security are an issue. The pitfalls when delivering 1000's of assessments on a continuous basis. How edgescan delivers vulnerability intelligence. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/semaformarch2018-edgescan-180320092110-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Discussion on how to deliver vulnerability management at scale. Why Fullstack vulnerability management is important and silos of security are an issue. The pitfalls when delivering 1000&#39;s of assessments on a continuous basis. How edgescan delivers vulnerability intelligence.
Keeping the wolf from 1000 doors. from Eoin Keary
]]>
155 1 https://cdn.slidesharecdn.com/ss_thumbnails/semaformarch2018-edgescan-180320092110-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security by the numbers /slideshow/security-by-the-numbers/90020553 securitybythenumbers-180308094033
Discussion on the edgescan 2018 Stats Report, most common vulnerabilities etc. Delivered in Sendai, Japan in February 2018]]>

Discussion on the edgescan 2018 Stats Report, most common vulnerabilities etc. Delivered in Sendai, Japan in February 2018]]>
Thu, 08 Mar 2018 09:40:33 GMT /slideshow/security-by-the-numbers/90020553 eoinkeary@slideshare.net(eoinkeary) Security by the numbers eoinkeary Discussion on the edgescan 2018 Stats Report, most common vulnerabilities etc. Delivered in Sendai, Japan in February 2018 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitybythenumbers-180308094033-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Discussion on the edgescan 2018 Stats Report, most common vulnerabilities etc. Delivered in Sendai, Japan in February 2018
Security by the numbers from Eoin Keary
]]>
354 1 https://cdn.slidesharecdn.com/ss_thumbnails/securitybythenumbers-180308094033-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web security everything we know is wrong cloud version /slideshow/web-security-everything-we-know-is-wrong-cloud-version/82826136 websecurityeverythingweknowiswrong-cloudversion-171127145120
A revised version for 2017 on an old OWASP talk from 2015. Web application security, Development security challenges and how we are approaching cyber security incorrectly for years...but there is hope!!]]>

A revised version for 2017 on an old OWASP talk from 2015. Web application security, Development security challenges and how we are approaching cyber security incorrectly for years...but there is hope!!]]>
Mon, 27 Nov 2017 14:51:20 GMT /slideshow/web-security-everything-we-know-is-wrong-cloud-version/82826136 eoinkeary@slideshare.net(eoinkeary) Web security everything we know is wrong cloud version eoinkeary A revised version for 2017 on an old OWASP talk from 2015. Web application security, Development security challenges and how we are approaching cyber security incorrectly for years...but there is hope!! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/websecurityeverythingweknowiswrong-cloudversion-171127145120-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A revised version for 2017 on an old OWASP talk from 2015. Web application security, Development security challenges and how we are approaching cyber security incorrectly for years...but there is hope!!
Web security everything we know is wrong cloud version from Eoin Keary
]]>
89 1 https://cdn.slidesharecdn.com/ss_thumbnails/websecurityeverythingweknowiswrong-cloudversion-171127145120-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity by the numbers /slideshow/cybersecurity-by-the-numbers/74058167 cybersecuritybythenumbers-170331095909
Why continuous assessment is required. How to keep pace with development and secure constant change. Vulnerability statistics across the fullstack. What are the most common security issues in the web application and host layer.]]>

Why continuous assessment is required. How to keep pace with development and secure constant change. Vulnerability statistics across the fullstack. What are the most common security issues in the web application and host layer.]]>
Fri, 31 Mar 2017 09:59:08 GMT /slideshow/cybersecurity-by-the-numbers/74058167 eoinkeary@slideshare.net(eoinkeary) Cybersecurity by the numbers eoinkeary Why continuous assessment is required. How to keep pace with development and secure constant change. Vulnerability statistics across the fullstack. What are the most common security issues in the web application and host layer. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritybythenumbers-170331095909-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Why continuous assessment is required. How to keep pace with development and secure constant change. Vulnerability statistics across the fullstack. What are the most common security issues in the web application and host layer.
Cybersecurity by the numbers from Eoin Keary
]]>
123 3 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritybythenumbers-170331095909-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ebu class edgescan-2017 /slideshow/ebu-class-edgescan2017/72662047 ebuclass-edgescan-2017-170228124253
Talk in Switzerland at European Broadcasting Union cyber security event - Feb 2017. Discussing some core aspects of secure application development, technical security controls and secure systems development lifecycle....]]>

Talk in Switzerland at European Broadcasting Union cyber security event - Feb 2017. Discussing some core aspects of secure application development, technical security controls and secure systems development lifecycle....]]>
Tue, 28 Feb 2017 12:42:52 GMT /slideshow/ebu-class-edgescan2017/72662047 eoinkeary@slideshare.net(eoinkeary) Ebu class edgescan-2017 eoinkeary Talk in Switzerland at European Broadcasting Union cyber security event - Feb 2017. Discussing some core aspects of secure application development, technical security controls and secure systems development lifecycle.... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ebuclass-edgescan-2017-170228124253-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talk in Switzerland at European Broadcasting Union cyber security event - Feb 2017. Discussing some core aspects of secure application development, technical security controls and secure systems development lifecycle....
Ebu class edgescan-2017 from Eoin Keary
]]>
829 4 https://cdn.slidesharecdn.com/ss_thumbnails/ebuclass-edgescan-2017-170228124253-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vulnerability management and threat detection by the numbers /slideshow/vulnerability-management-and-threat-detection-by-the-numbers-66302247/66302247 vulnerabilitymanagementandthreatdetectionbythenumbers-160922131850
More on Vulnerability Management from Daggercon 2015 Keynote.]]>

More on Vulnerability Management from Daggercon 2015 Keynote.]]>
Thu, 22 Sep 2016 13:18:50 GMT /slideshow/vulnerability-management-and-threat-detection-by-the-numbers-66302247/66302247 eoinkeary@slideshare.net(eoinkeary) Vulnerability management and threat detection by the numbers eoinkeary More on Vulnerability Management from Daggercon 2015 Keynote. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilitymanagementandthreatdetectionbythenumbers-160922131850-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> More on Vulnerability Management from Daggercon 2015 Keynote.
Vulnerability management and threat detection by the numbers from Eoin Keary
]]>
157 2 https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilitymanagementandthreatdetectionbythenumbers-160922131850-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-eoinkeary-48x48.jpg?cb=1698755103 CTO: www.edgescan.com Director at www.bccriskadvisory.com Global Board Member of OWASP 2009-2014 Founder of OWASP Ireland chapter. Co-Author,Co - Editor and team lead of the OWASP Testing Guide v2.0 Co-Author, Editor/team lead of the OWASP Code Review guide v1.1 OWASP CISO Guide OWASP CISO Survey originator J2EE/Java developer CISSP, CISA, BA, BAI, Dip Eng, MIEI www.edgescan.com https://cdn.slidesharecdn.com/ss_thumbnails/iisf-march2023-230808110711-29ada01d-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/iisfmarch2023pptx/259725520 IISF-March2023.pptx https://cdn.slidesharecdn.com/ss_thumbnails/validationofvulnerabilities-230201135237-4855292f-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/validation-of-vulnerabilitiespdf/255645043 Validation of vulnerab... https://cdn.slidesharecdn.com/ss_thumbnails/doesahybridmodelforvulnerabilitymanagementmakesense-230201134648-639033e2-thumbnail.jpg?width=320&height=320&fit=bounds eoinkeary/does-a-hybrid-model-for-vulnerability-management-make-sensepdf Does a Hybrid model fo...