Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Determining Exploitability of Vulnerabilities with SBOM and VEX

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to leverage Software Bill of Materials (SBOM) and Vulnerability Exchange (VEX) documents to determine the actual exploitability of vulnerabilities in third-party code components. Explore the challenges of Software Composition Analysis tools that generate overwhelming amounts of vulnerability data, and discover how internal developer context about third-party package usage is crucial for accurate vulnerability assessment. Understand the compliance requirements stemming from Executive Order 14028 "Improving the Nation's Cybersecurity" that mandates SBOM and VEX generation for critical software vendors and federal agencies. Examine how these documents can serve beyond mere compliance as powerful resources for vulnerability exploitability analysis. Discover automated approaches to SBOM and VEX generation that achieve scalable compliance while simultaneously reducing false positives in vulnerability assessments. Gain insights into practical implementation strategies that enhance customer trust by providing more accurate vulnerability reporting and improving supply chain security posture for both government and commercial environments.

Syllabus

Determining Exploitability of Vulnerabilities with SBOM and VEX

Taught by

Black Hat

Reviews

Start your review of Determining Exploitability of Vulnerabilities with SBOM and VEX

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.