Power BI Fundamentals - Create visualizations and dashboards from scratch
Master Windows Internals - Kernel Programming, Debugging & Architecture
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to leverage Software Bill of Materials (SBOM) and Vulnerability Exchange (VEX) documents to determine the actual exploitability of vulnerabilities in third-party code components. Explore the challenges of Software Composition Analysis tools that generate overwhelming amounts of vulnerability data, and discover how internal developer context about third-party package usage is crucial for accurate vulnerability assessment. Understand the compliance requirements stemming from Executive Order 14028 "Improving the Nation's Cybersecurity" that mandates SBOM and VEX generation for critical software vendors and federal agencies. Examine how these documents can serve beyond mere compliance as powerful resources for vulnerability exploitability analysis. Discover automated approaches to SBOM and VEX generation that achieve scalable compliance while simultaneously reducing false positives in vulnerability assessments. Gain insights into practical implementation strategies that enhance customer trust by providing more accurate vulnerability reporting and improving supply chain security posture for both government and commercial environments.
Syllabus
Determining Exploitability of Vulnerabilities with SBOM and VEX
Taught by
Black Hat