Every five to ten years, major technology shifts change the way that vulnerability assessment and the related IT risk mitigation processes are approached or implemented. What has remained constant is the formula we use to measure risk and thus prioritize and triage vulnerabilities.
Risk = (Likelihood of event) * (Impact of consequences)
It’s an approach that intuitively makes sense, but there have been two challenges with how this formula has been applied.
This is where custom likelihood comes in. Understanding your own likelihood is critical for prioritization and triage.
Historically, the largest input to the likelihood component in the risk equation has been internal:
The last point, the vulnerable asset count, has always been a key component in an internal vulnerability priority score since it quantifiably impacts the exposure that a vulnerability creates. If 1,000 endpoints present the same vulnerability, it’s more likely that the risk will manifest in comparison to if only one of the devices present the vulnerability.
Today, organizations have a new wealth of internal and external data available to make more data-informed, or data-driven choices with regard to actions to take and threats to respond to. While exposure is an important input into the risk equation, it only really has relevance once you understand your threat landscape and the handful of adversaries you are going against. For example:
These are elements that the enterprise has absolutely no control over but can get visibility into in order to get ahead of the response process, or stop current mitigation efforts and pivot to other issues that are potentially more likely to impact you.
Melding internal and external threat data to enhance prioritization and triage
ThreatQuotient’s data-driven security operations platform, ThreatQ, helps organizations use a data-driven approach to address vulnerability management and prioritization. ThreatQ uses its DataLinq Engine to fuse together disparate data sources and tools to help teams prioritize, automate and collaborate on security incidents; enables more focused decision making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats and the ability to automate processes with high fidelity data.
To learn more about how to implement a data-driven approach to risk-based vulnerability management, the tools and technologies ThreatQ integrates with to inform vulnerability management, and real-world customer use cases, download our new whitepaper today.