High-level introductions to CVEs
Scariest CVEs and Exploit Techniques of 2022
CVE processes, Patch Tuesdays and trends to carry into 2023


Tenzir's Mark Mastrangeli using his breakout session to cover the impact of situational awareness to make more actionable processes. As the scope of CVEs continually grow, having a consistent process and chain of command for notifying, investigating, escalating, and remediating is more important than ever. Watch this session to arm your team with proactive insights from an industry veteran formerly with McAfee and Intel.

The key to stopping ransomware isn’t focusing on the end of the attack, it’s catching the “pre-ransomware” activity that leads up to that point. If you can detect the threats that deliver the ransomware, you can stop the ransomware before it can cause damage. Knowing where and what to look for could mean the difference between a painful response and another day at the office. Listen in as Red Canary's Laura Hamel reviews key trends from Red Canary's Threat Intelligence Report, how to detect pre-ransomware activity and guidance on identifying the steps that commonly precede a ransomeware outbreak.

Fixing vulnerabilities is really a decision-making process for System Admins. The What, When, and How must be addressed to ensure the most critical vulnerabilities are prioritized and the steps to mitigate them are followed per the CVE. Listen in as Dustin Reybrouck, System and Security Admin of 17 years, discusses specific examples to uncover the root causes of reported CVEs to better understand and prioritize your patching processes.