狠狠撸

狠狠撸Share a Scribd company logo
Jaya Baloo
Victor Gevers
Michiel Steltman
One conference 2019
The compelling case for vulnerability management
One conference 2019 the vulnerability management on steroids
Why are we vulnerable ?
“We are vulnerable, because hard- and software has vulnerabilities.
The bad guys find them and use them for themselves.
So we need good guys to find them too, and then fix those leaks. It’s all we have”
Bruce Schneier
So, why don’t we just patch?
4
The patching process for companies explained
5
?
Sounds easy but hard to achieve 100%
6
?
Too much to deal with
7
8
Digital
Infrastructure,
Including LIRs
Companies
with digital
presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment
Digital
Services
Plan B: Coordinated responsible disclosure / Bug bounties
Common
approach:
“Motivate”
Add:
Actual
Information
Coordinated responsible disclosure
=> towards: CRD on steroids
10
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
networks
Add performance
information
Collect and
aggregate
Forward
&
Policy
Members & Constituents of:
What can and should LIRs do?
11
** Where does LIR responsibility start and stop **?
-> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting this going
This goes way beyond ISP abuse mitigation!
-LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”:
- Monitor: Which badness is visible in my networks: vulnerabilities and abuse
- Receive: Subscribe to feeds, receive abuse- and vulnerability information
- Triage: Who has the actual problem, which user or cusromer?
- Forward: Who can and should fix this?
- Policy: “motivate” users / customers to act, or act yourself
Key Question to RIPE community and LIRs?
12
- Do you agree that this “actual vulnerability”approach can be very effective?
- Do you agree that the LIR is a key middleman in this approach?
Concrete actions for such LIRs, what can you already do NOW:
- Start with this mindset
- Update your policies, accept code of conduct NtD and Abuse
- Be reachable !
- Subscribe to offered aggregated feeds
- Forward info and act , to customers / users
- Using standard OSS systems such as Abuse-IO
? If this initiative will start, are YOU prepared to participate ?
13
The current approach : motivate companies to patch 100%, is insufficient
The solution: Find ACTUAL leaks, aggregate, add performance info, then forward the info to
those who can fix– or who can make someone fix
In NL: All we need is already there! Just need to go on steroids
Gov: (NCSC): take the lead, organize the PPP, connect the dots.
Providers / LIRS: Adopt the CoC and start make the difference
Time to act, Now!

More Related Content

What's hot (11)

PDF
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCASG Community Manager
?
PDF
Global challenges, new paradigms
Peter Jones [LION: li.blueoyster~@~gmail.com]
?
PPTX
Identity Federation for the Enterprise: Lessons Learned
Nalneesh Gaur
?
PDF
'Right to disconnect' policies only support life balance, right?
Ada Barlatt
?
PDF
Digital trust and cyber challenge now extends beyond the Enterprise
Mourad Khalil
?
PPTX
Creating Mobile Experience
Cisco Middle East
?
PDF
Data & Digital Ethics: some thoughts
Kate Carruthers
?
PDF
brochure
Ari J?rvinen
?
PPTX
Jodie G
Hilary Ip
?
PPT
Scl Group Collaboration Beyond Web 20
Richard Zbinden
?
PPT
Jo Birch - DAS Presentation
jhbirch
?
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCASG Community Manager
?
Global challenges, new paradigms
Peter Jones [LION: li.blueoyster~@~gmail.com]
?
Identity Federation for the Enterprise: Lessons Learned
Nalneesh Gaur
?
'Right to disconnect' policies only support life balance, right?
Ada Barlatt
?
Digital trust and cyber challenge now extends beyond the Enterprise
Mourad Khalil
?
Creating Mobile Experience
Cisco Middle East
?
Data & Digital Ethics: some thoughts
Kate Carruthers
?
brochure
Ari J?rvinen
?
Jodie G
Hilary Ip
?
Scl Group Collaboration Beyond Web 20
Richard Zbinden
?
Jo Birch - DAS Presentation
jhbirch
?

Similar to One conference 2019 the vulnerability management on steroids (20)

PDF
Digital disruption – dive in to thrive
Николай Соловьёв
?
PPTX
Iconuk 2016 - IBM Connections adoption Worst practices!
Femke Goedhart
?
ODP
If you build it, will they come? Debunking the myths of social software adoption
Suzanne Livingston
?
PPT
TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
Brian F. Eddy
?
PDF
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Business Development Institute
?
PDF
The 2013 Social Business Benchmark Preliminary Findings
Leader Networks
?
PPTX
12 Items You Need To Include In Your Mobile Healthcare App Brief
Scott Hague
?
PPTX
Collaboration Excellence: Strategies for Enabling a Social Business
Perficient, Inc.
?
PPTX
Transforming Healthcare: Build vs Buy
ibi
?
PDF
How to Manage Your Remote Workforce – What Does The New Norm Look Like post C...
Darryl Judd
?
PDF
Behavioural Economics & Financial Services: Improving Customer Outcomes
Prime Decision
?
PDF
Argyle CMO Summit 2015
Mathew Sweezey
?
PPTX
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
SMASH Summit
?
PPTX
Lessons Learned by Social Businesses, 10 June 2014
CambsChamber
?
PDF
Vendor Risk Mgmt Ravi-Licata
Lena Licata
?
PDF
How to sell the vision & value of online community
Get Satisfaction
?
DOCX
Interview with pam morris
Computer Aid, Inc
?
PPTX
The future NGO is agile
MzN International
?
PDF
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
Franco Ferrario
?
DOCX
??? (Rutgers Innovation Key Note)
Bob Prieto
?
Digital disruption – dive in to thrive
Николай Соловьёв
?
Iconuk 2016 - IBM Connections adoption Worst practices!
Femke Goedhart
?
If you build it, will they come? Debunking the myths of social software adoption
Suzanne Livingston
?
TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
Brian F. Eddy
?
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Business Development Institute
?
The 2013 Social Business Benchmark Preliminary Findings
Leader Networks
?
12 Items You Need To Include In Your Mobile Healthcare App Brief
Scott Hague
?
Collaboration Excellence: Strategies for Enabling a Social Business
Perficient, Inc.
?
Transforming Healthcare: Build vs Buy
ibi
?
How to Manage Your Remote Workforce – What Does The New Norm Look Like post C...
Darryl Judd
?
Behavioural Economics & Financial Services: Improving Customer Outcomes
Prime Decision
?
Argyle CMO Summit 2015
Mathew Sweezey
?
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
SMASH Summit
?
Lessons Learned by Social Businesses, 10 June 2014
CambsChamber
?
Vendor Risk Mgmt Ravi-Licata
Lena Licata
?
How to sell the vision & value of online community
Get Satisfaction
?
Interview with pam morris
Computer Aid, Inc
?
The future NGO is agile
MzN International
?
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
Franco Ferrario
?
??? (Rutgers Innovation Key Note)
Bob Prieto
?
Ad

Recently uploaded (20)

PPTX
BitRecover OST to PST Converter Software
antoniogosling01
?
PPTX
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
?
PDF
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
?
PDF
I Want to join occult brotherhood for money ritual#((+2347089754903))
haragonoccult
?
PPTX
Lesson 1.1 Career-Opportunities-in-Ict.pptx
lizelgumadlas1
?
PDF
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
?
PPTX
My Mother At 66! (2).pptx00000000000000000000000000000
vedapattisiddharth
?
PDF
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
?
PDF
ContextForge MCP Gateway - the missing proxy for AI Agents and Tools
Mihai Criveti
?
PDF
What Is Google Chrome? Fast & Secure Web Browser Guide
hgfdsqetuiplmnvcz43
?
PPT
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
?
PDF
The Convergence of Threat Behaviors Across Intrusions
Joe Slowik
?
PDF
Materi tentang From Digital Economy to Fintech.pdf
Abdul Hakim
?
PDF
Download Google Chrome for Fast and Secure Web Browsing Experience
hgfdsqetuiplmnvcz43
?
PPTX
Class_4_Limbgvchgchgchgchgchgcjhgchgcnked_Lists.pptx
test123n
?
PPTX
原版一样(滨厂惭毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
?
PPTX
Q1 English3 Week5 PPT-MATATAG@edumaymay.pptx
JenniferCawaling1
?
PDF
Transmission Control Protocol (TCP) and Starlink
APNIC
?
PDF
Google Chrome vs Other Browsers: Why Users Still Prefer It.pdf
hgfdsqetuiplmnvcz43
?
PDF
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
?
BitRecover OST to PST Converter Software
antoniogosling01
?
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
?
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
?
I Want to join occult brotherhood for money ritual#((+2347089754903))
haragonoccult
?
Lesson 1.1 Career-Opportunities-in-Ict.pptx
lizelgumadlas1
?
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
?
My Mother At 66! (2).pptx00000000000000000000000000000
vedapattisiddharth
?
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
?
ContextForge MCP Gateway - the missing proxy for AI Agents and Tools
Mihai Criveti
?
What Is Google Chrome? Fast & Secure Web Browser Guide
hgfdsqetuiplmnvcz43
?
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
?
The Convergence of Threat Behaviors Across Intrusions
Joe Slowik
?
Materi tentang From Digital Economy to Fintech.pdf
Abdul Hakim
?
Download Google Chrome for Fast and Secure Web Browsing Experience
hgfdsqetuiplmnvcz43
?
Class_4_Limbgvchgchgchgchgchgcjhgchgcnked_Lists.pptx
test123n
?
原版一样(滨厂惭毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
?
Q1 English3 Week5 PPT-MATATAG@edumaymay.pptx
JenniferCawaling1
?
Transmission Control Protocol (TCP) and Starlink
APNIC
?
Google Chrome vs Other Browsers: Why Users Still Prefer It.pdf
hgfdsqetuiplmnvcz43
?
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
?
Ad

One conference 2019 the vulnerability management on steroids

  • 1. Jaya Baloo Victor Gevers Michiel Steltman One conference 2019 The compelling case for vulnerability management
  • 3. Why are we vulnerable ? “We are vulnerable, because hard- and software has vulnerabilities. The bad guys find them and use them for themselves. So we need good guys to find them too, and then fix those leaks. It’s all we have” Bruce Schneier
  • 4. So, why don’t we just patch? 4
  • 5. The patching process for companies explained 5 ?
  • 6. Sounds easy but hard to achieve 100% 6 ?
  • 7. Too much to deal with 7
  • 8. 8 Digital Infrastructure, Including LIRs Companies with digital presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment Digital Services Plan B: Coordinated responsible disclosure / Bug bounties Common approach: “Motivate” Add: Actual Information
  • 10. => towards: CRD on steroids 10 Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan networks Add performance information Collect and aggregate Forward & Policy Members & Constituents of:
  • 11. What can and should LIRs do? 11 ** Where does LIR responsibility start and stop **? -> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting this going This goes way beyond ISP abuse mitigation! -LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”: - Monitor: Which badness is visible in my networks: vulnerabilities and abuse - Receive: Subscribe to feeds, receive abuse- and vulnerability information - Triage: Who has the actual problem, which user or cusromer? - Forward: Who can and should fix this? - Policy: “motivate” users / customers to act, or act yourself
  • 12. Key Question to RIPE community and LIRs? 12 - Do you agree that this “actual vulnerability”approach can be very effective? - Do you agree that the LIR is a key middleman in this approach? Concrete actions for such LIRs, what can you already do NOW: - Start with this mindset - Update your policies, accept code of conduct NtD and Abuse - Be reachable ! - Subscribe to offered aggregated feeds - Forward info and act , to customers / users - Using standard OSS systems such as Abuse-IO ? If this initiative will start, are YOU prepared to participate ?
  • 13. 13 The current approach : motivate companies to patch 100%, is insufficient The solution: Find ACTUAL leaks, aggregate, add performance info, then forward the info to those who can fix– or who can make someone fix In NL: All we need is already there! Just need to go on steroids Gov: (NCSC): take the lead, organize the PPP, connect the dots. Providers / LIRS: Adopt the CoC and start make the difference Time to act, Now!