Examining the Software Vulnerability Lifecycle Across Different Industry Verticals

Premiere: 5/15 12:00 - 12:30 

Replays: 5/15 18:00 - 18:30, 5/16 00:00 - 00:30


Security bugs in software have a lifecycle-they go from discovery to exploitation to patch and then-usually-they go away. At each stage of this lifecycle, organizations can take different approaches to minimize the risk to themselves and their customers. Unfortunately, many industries find themselves with unique challenges when trying to respond to vulnerabilities due to the nature of their products and manufacturing processes. For example, vehicles have complicated supply chains and many third-party components that must be kept current and harden to defend against modern attacks.

This presentation examines some of these unique areas that various industries should be aware of when it comes to handling vulnerabilities and monitoring the threat landscape. Based on lessons learned from Trend Micro’s Zero Day Initiative, the world’s largest vendor-agnostic bug bounty program, along with the Pwn2Own hacking contest, we examine how industries have tackled these challenges, where they were successful, and where they failed. Finally, we highlight some recommendations hardware and software manufacturers should consider when managing the lifecycle of vulnerabilities.

Brian Gorenc
講者
Trend Micro
VP, Threat Research

TOPIC / TRACK
CYBERSEC GLOBAL

LEVEL
中階 中級議程聚焦在資安架構、工具與實務應用等,適合已經具備資安基礎的資安與資訊人員。

SESSION TYPE
Live Stream Session

LANGUAGE
英文

SUBTOPIC
Zero-day Vulnerability
Risk Management
Vulnerability Management