About This Training
Understanding the exposure of your embedded systems to cybersecurity threats requires analysis of a continuous stream of vulnerabilities and how they apply to a product.
But which vulnerabilities apply to your software components?
And how big of a risk do specific CVEs pose to your product? Which have the greatest chance of being exploited in deployment?
Which ones put your customers at the greatest risk of a security breach?
Emergency room doctors triage patients to determine whom to help first.
Similarly, a vulnerability triage process enables your team to understand which vulnerabilities need to be fixed first.
This training explores best practices for answering these questions using this process.
What You Will Learn
- Monitoring and filtering vulnerabilities to pinpoint those that apply to your products.
- Identifying and reducing false positives and other time-wasting issues.
- Efficient triaging of vulnerabilities to prioritize them based on risk and applicability to your product configurations.
- Mitigation planning and execution, including team sharing and collaboration, analysis and patching and updating considerations.
VP of EMEA Business Development and Technical Sales, Timesys