Predicting Vulnerability Exploitation - How to Assess Cybersecurity Risks
USENIX Enigma Conference via YouTube
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Syllabus
Intro
How Do You Give Security Advice?
To Patch or Not To Patch?
Can We Predict Exploits?
Must Validate Predictions-Exploits in the Wild
Machine Learning and Security Predictions
Prediction With Intrinsic Features [2010]
What Are We Predicting?
Intuition: CVE-2017-0144
Mining Twitter to Predict Exploitation
Predicting Exploits in the Wild
Did We Get Lucky?
Time to Patch 50% of Vulnerable Hosts Observed patching of 1,593 vulnerabilities over 5 years
One Vulnerability, Different Patches
#3. Patching Patterns As Risk Factors
#3. Prediction Performance
What You Can Do Today
What You Can Do Tomorrow
Taught by
USENIX Enigma Conference