Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Rethinking Vulnerability Management with RSnake

Fortra
04/24/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Fewer than 10% of the 329,000+ CVEs in existence actually lead to business losses, yet most organizations treat vulnerability management as a completionist exercise of patching everything rather than focusing on what adversaries actually exploit
  • Between 40-50% of all security losses stem from remotely exploitable vulnerabilities in perimeter security devices (firewalls, VPNs) with exposed management interfaces, while web application vulnerabilities show virtually no correlation with losses in actuarial data
  • CVSS base scores and EPSS predictions fail to align with real-world adversarial behavior, with some actively exploited vulnerabilities having no CVSS score at all and others scoring as low as 2.9 while driving significant losses
  • Cyber insurers have identified multi-factor authentication on external-facing systems as one of the few controls with measurable impact on reducing losses, with one insurer experiencing massive claims after temporarily removing MFA requirements
  • DFIR teams can identify initial access vectors in only 10% of non-ransomware cases due to inadequate logging and forensic capabilities, creating fundamental gaps in the actuarial data needed to improve vulnerability prioritization
  • The future of vulnerability management lies in evidence-based approaches that provide comprehensive intelligence from multiple sources rather than prescriptive prioritization, empowering organizations to make informed decisions based on their specific business context and risk tolerance

The Vulnerability Management Crisis

This podcast episode challenges fundamental assumptions about vulnerability management, featuring Robert "RSnake" Hansen discussing his evidence-based research into what actually drives security losses. Hansen reveals that fewer than 10% of the 329,000+ CVEs in existence lead to actual business losses, with CISA's Known Exploited Vulnerabilities catalog containing only 1,300 entries — representing just 0.44% of all CVEs. The conversation explores why organizations continue treating vulnerability management and patch management as interchangeable practices, despite evidence showing that completionist approaches waste resources on vulnerabilities that adversaries never exploit. Hansen argues that current prioritization methods — including CVSS base scores and EPSS predictions — fail to align with adversarial behavior, leaving organizations focused on theoretical risks while missing the vulnerabilities actually being weaponized in the wild.

Where Adversaries Actually Attack

The discussion reveals critical patterns in how breaches actually occur, with 40-50% of all losses stemming from remotely exploitable CVEs in perimeter security devices — the very tools meant to protect organizations. Hansen explains that cyber insurers have identified that exposed management interfaces on firewalls, VPNs, and other perimeter devices represent the primary attack vector, with multi-factor authentication proving to be one of the few controls that demonstrably reduces losses. Interestingly, web application security — despite decades of investment and attention — shows virtually no correlation with business losses in actuarial data, suggesting the industry may have over-engineered this domain to the point where adversaries shifted to easier targets. The conversation also addresses the challenge of attribution, with DFIR teams able to identify initial access vectors in only 10% of non-ransomware cases, highlighting fundamental gaps in logging and forensic capabilities that prevent better actuarial understanding.

Moving Toward Evidence-Based Prioritization

Hansen introduces his company RID Evidence's approach to vulnerability management, which focuses on providing comprehensive intelligence rather than prescriptive prioritization. The methodology aggregates data from multiple vulnerability databases across different countries (which score the same CVEs differently), combines it with actuarial data from cyber insurers and DFIR teams, and presents organizations with evidence to make informed decisions based on their specific business context. This represents a philosophical shift from telling organizations what to fix to empowering them with data about what adversaries are actually exploiting, what's leading to losses, and what controls demonstrably reduce risk. The conversation acknowledges that while evidence-based prioritization is optimal, organizations must balance actuarial reality with compliance requirements, vendor mandates, and business constraints — making the goal not to eliminate subjectivity but to ensure subjective decisions are informed by objective data about adversarial behavior and real-world outcomes.

Chapters

0:00 - Introduction to Vulnerability Management
1:10 - Guest Introduction: Robert Hansen
2:25 - Defining VM vs Patch Management
4:03 - The CVE Reality: Sub-10% Lead to Loss
8:53 - Rethinking Prioritization Cutoffs
10:07 - The CVSS Scoring Problem
13:02 - Actuarial Data vs Theoretical Risk
15:32 - Where Adversaries Actually Attack
17:50 - Web App Security: Breaches Without Loss
19:07 - DFIR Challenges and Attribution Gaps
20:19 - Perimeter Device Configuration
22:03 - The MFA Impact on Losses
23:09 - Evolving VM for the Future
24:20 - Evidence-Based Approach
29:02 - EPSS Limitations
31:25 - Closing Thoughts and Call to Action

Key Quotes

4:03 "I know for a fact that sub 10% of CVEs, which are the exposures you're referring to, there's 800 of them, by the way, but sub 10% of them are actually leading to losses."
7:21 "It turns out it doesn't really correlate with loss, or even breach, which is a lower bar."
8:53 "If that's the case, why not make better decisions about where the cutoff is? That's really all I'm getting to."
11:02 "The latest guidance coming out from the PCI DSS, from PCI, from First.org, their consumer usage, the one, the first sentence of the conclusion basically says you should not use this for your vulnerability management program, the base score, which is what exactly what everyone's doing."
15:32 "If you talk with the reinsurers, because they have a sort of macroscopic view of the world, they sort of, they look at all these programs and everything that everyone has. And one of the things they're not concerned about is whether you have a perimeter firewall. It does not impact your security level because that is exactly how the adversaries are getting in, it's through that exact device."
17:07 "About 40 to 50 percent of all losses come from that alone. And the others come from drive-by-downloads and malicious payloads sent over email or whatever. So if we focus where the adversaries are, we can disrupt them and force them to shift into other areas."
17:50 "That leads to breaches, but not loss. There's no losses there. So that's your difference."
19:43 "If you remove ransomware, because ransomware is super easy to find for a variety of reasons, they tend to use the same exploits over and over, then they can only find the initial access vector in 10% of the cases."
22:03 "One of the cyber insurers, for competitive reasons, decided to test removing MFA from their criteria to see what happened, if they could make more premiums that way. And they did, but they also had massive losses because no one turned on MFA for those external devices."
24:20 "I don't want to be in the business of prioritization. I just want to be in the business of saying, here's what we think is true. We have a warranty if we get it wrong and you're on your own because you were always on your own. But here's all the evidence to make a good decision."
Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Vulnerability Management
  • Security Operations
  • Best Practices
  • Technical Deep Dive
  • Threat Intelligence
  • Patch Management
  • CVE Prioritization
  • CVSS Limitations
  • Cyber Insurance
  • Actuarial Security Data
  • Perimeter Security
  • Multi-Factor Authentication
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Rethinking Vulnerability Management with RSnake

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version