You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p>This <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of risk, the related standards and data sources, and how you can apply them for an effective <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
1457
+
<p>This <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of <ahref="../Scope/#per-vulnerability">Relative <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per Vulnerability</a>, the related standards and data sources, and how you can apply them for an effective <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
1458
1458
<p>It is written by, or contributed to, some of the thought leaders in this space <strong>for YOU.</strong></p>
1459
1459
<p><ahref="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities"><abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr></a>, <ahref="https://www.gartner.com/smarterwithgartner/focus-on-the-biggest-security-threats-not-the-most-publicized">Gartner</a>, and others, recommend focusing on vulnerabilities that are known-exploited as an effective approach to risk mitigation and prevention, yet very few organizations do this. </p>
1460
1460
<p>Maybe because they don't know they should, why they should, or how they should? This guide will cover all these points.</p>
- Generic vulnerability data - not the organization-specific context</p>
1344
-
<p>A different way of looking at this is that this guide can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1344
+
<p>A different way of looking at this is that this guide (and the prioritization schemes herein), can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1345
+
<p>In other words, Relative <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per vulnerability.</p>
<p>This <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of risk, the related standards and data sources, and how you can apply them for an effective <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
1531
+
<p>This <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Guide is a pragmatic user-centric view of <ahref="#introduction-scope-per-vulnerability">Relative <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per Vulnerability</a>, the related standards and data sources, and how you can apply them for an effective <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization for your organization.</p>
1532
1532
<p>It is written by, or contributed to, some of the thought leaders in this space <strong>for YOU.</strong></p>
1533
1533
<p><ahref="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities"><abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr></a>, <ahref="https://www.gartner.com/smarterwithgartner/focus-on-the-biggest-security-threats-not-the-most-publicized">Gartner</a>, and others, recommend focusing on vulnerabilities that are known-exploited as an effective approach to risk mitigation and prevention, yet very few organizations do this. </p>
1534
1534
<p>Maybe because they don't know they should, why they should, or how they should? This guide will cover all these points.</p>
- Generic vulnerability data - not the organization-specific context</p>
1709
-
<p>A different way of looking at this is that this guide can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1709
+
<p>A different way of looking at this is that this guide (and the prioritization schemes herein), can be used as a first pass triage and prioritization of vulnerabilities, before the overall asset-specific business and runtime context, and remediation context, is considered, and all the context-specific dependencies that go with that.</p>
1710
+
<p>In other words, Relative <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> per vulnerability.</p>
0 commit comments