Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Why CVE Disclosure Builds Trust and Strengthens Security

Ivanti
04/06/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • CVE disclosure by vendors reflects proactive security practice and enables the broader community to identify similar vulnerabilities in their own systems, particularly important given shared open-source components.
  • Zero-day CVEs requiring immediate patching differ fundamentally from responsibly disclosed CVEs, which allow organizations time to assess impact and plan remediation based on their specific configurations.
  • Secure by design principles—including memory-safe languages, continuous code inspection, and careful third-party component evaluation—must be integrated throughout development rather than tested in at the end.
  • Modern threat actors operate as specialized cyber gangs using 'living off the land' techniques to capture legitimate credentials and return undetected, requiring least-privilege access controls.
  • Organizations should be wary of vendors who aren't disclosing CVEs, as this likely indicates inadequate security programs and ad hoc approaches to vulnerability management.

Understanding CVEs and Responsible Disclosure

The webinar opens with a foundational explanation of Common Vulnerabilities and Exposures (CVEs) and why their disclosure actually represents responsible security practice rather than cause for alarm. Mike Riemer distinguishes between internally discovered CVEs—found through static and dynamic code analysis—and zero-day vulnerabilities that emerge from active threat actor exploitation. The key insight is that transparent CVE disclosure serves dual purposes: it enables defenders to understand and monitor for specific weaknesses while allowing other software vendors to check their own codebases for similar issues, particularly important given the widespread use of open-source components across the industry.

Secure by Design Principles in Practice

Karl Triebes outlines Ivanti's proactive security approach, emphasizing that security cannot simply be tested into products at the end of development. The secure by design methodology encompasses selecting memory-safe programming languages like Python, Rust, and Go for new products, conducting regular penetration testing, implementing code inspection during development rather than just at completion, and carefully evaluating third-party components including open-source libraries. The discussion highlights how seemingly moderate CVSS scores can become serious attack vectors when combined with other vulnerabilities—what Triebes calls 'low and slow attacks' that represent some of the most pernicious threats organizations face.

The Evolving Threat Landscape and Organizational Response

The conversation turns to how dramatically the threat landscape has changed, with Riemer noting the shift from perhaps one attack per year decades ago to a dozen or more daily attempts now. Modern threat actors operate as organized 'cyber gangs' with specialized roles—one group exploits initial access, another conducts internal reconnaissance, and a third executes the actual data theft or ransomware deployment. The 'living off the land' technique, where attackers quietly capture legitimate user credentials and return later masquerading as valid employees, represents a particularly challenging threat that requires least-privilege access controls and continuous monitoring to counter.

Practical Guidance for Security Posture

Both speakers emphasize actionable steps organizations should take, including treating security teams as business partners rather than obstacles, implementing exposure management tools to identify and prioritize risks, and establishing robust CVE management processes that quickly triage incoming vulnerabilities for actual impact rather than relying solely on CVSS scores. The discussion addresses the tension between government agencies requiring 30 to 180 days of testing before deploying patches and the need for rapid response to zero-day threats. Organizations are advised to scrutinize their vendors' security practices, demand transparency around CVE disclosure, and recognize that vendors who aren't publishing CVEs likely lack robust security programs altogether.

Chapters

0:00 - Introduction and Speaker Backgrounds
2:34 - Defining CVEs and Zero-Days
6:18 - Why CVE Disclosure Matters
8:54 - Developing CVE Management Strategies
16:43 - Government and Enterprise Patching Challenges
19:34 - Proactive Security and Secure by Design
24:32 - Secure by Default Configuration
27:02 - Industry and Government Collaboration
36:53 - The Evolving Threat Landscape
42:01 - AI-Powered Threats and Final Recommendations

Key Quotes

6:27 "If companies aren't disclosing it, then likely they're not implementing best security practices. That's also an indication they don't have a robust security practice."
8:47 "At the end of the day, visibility makes us all stronger."
21:56 "I like to call these low and slow attacks. And I think these are the most difficult and pernicious to go deal with."
25:03 "It's been a habit of vendors in the past to create a default configuration that was open. So you would just plug it in and it would work... While that's great from a user perspective, it's very insecure from a threat actor perspective."
38:04 "Threat actors are creating what we're calling cyber gangs. So you have the threat actors that exploit the device to get into it. Then they turn it over to another body that actually uses their skill set to infiltrate the actual system."

Categories:
  • » Webinar Library » Ivanti
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Vulnerability Management
  • Security Operations
  • Compliance & Governance
  • Webinar
  • Best Practices
  • CVE disclosure
  • vulnerability management
  • secure by design
  • zero-day vulnerabilities
  • threat actor tactics
  • patch management
  • least privilege access
  • social engineering
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Why CVE Disclosure Builds Trust and Strengthens Security

              Upcoming Webinar Calendar

              • 04/08/2026
                11:00 AM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202611:00 AM ET
                • Apr
                  15

                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                  04/15/202601:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    • Apr
                      30

                      The New Economics of VMware Exit

                      04/30/202601:00 PM ET
                      More events
                      Truth in IT
                      • Sponsor
                      • About Us
                      • Terms of Service
                      • Privacy Policy
                      • Contact Us
                      • Preference Management
                      Desktop version
                      Standard version