vulnerability management
Fix first: the cyber Remediation reimagined podcast

The shift to exposure first vulnerability management

James: OK, let's dive in. We're here to unpack a monumental shift in the security world, specifically in vulnerability management, or VM. For what feels like decades, the playbook was pretty simple. You'd run a quarterly scan, get this huge spreadsheet back, sort it by the CVSS score, and just start patching from the top down. But based on everything we're looking at today, that whole playbook isn't just old. It's actually dangerous now. So our mission for this deep dive is to get to the bottom of what replaced it. we're looking at this move to what's being called exposure-first security. That's the key phrase. And it seems to be defined by this blend of continuous processes, new transparency mandates, and some really aggressive regulatory pressure.

Katie: It really is. The whole idea is that organizations have to stop treating a vulnerability as, you know, just another IT ticket, something that lives and dies in a spreadsheet. The goal now is running an always-on program. It's a truly continuous security operation. And to do that, you have to blend a few things. You need real-time visibility of your attack surface. You need exploit likelihood intelligence. We can talk about EPSS later. And you have to have that supply chain assurance, which means the software bill of materials. And then you wrap it all in automation. The whole game is about speed.

James: That sounds incredibly complex and expensive. If that old way, the whole CVSS sorting quarterly scan, that was the standard for so long. What actually broke it? I mean, why couldn't it just absorb the new pressures?

Katie: It was really a perfect storm. And the theme of that storm was velocity and accountability. The old model was just, it was fundamentally too slow. It couldn't keep pace. Not with the number of new vulnerabilities and certainly not with the speed hackers were weaponizing them. So the first major force is what we call exploit velocity. You just can't afford to wait 90 days to fix something that might be exploited by, say, a nation state tomorrow. The best example is CISA's Known Exploited Vulnerabilities Catalog, the KEV.

James: Ah, the KEV.

Katie: Right. And it's not a static list. It updates constantly, and it sets these immediate hard deadlines for federal agencies to patch.

James: So federal policy basically created this public list of, fix this right now.

Katie: Exactly. And what's so interesting is that the private sector has sort of quietly adopted K.E.V. as its new baseline.

James: As the anchor.

Katie: As the anchor. Yeah. If something's on the K.E.V. list, it means it is actively being used by attackers in the wild. That knowledge alone just it cuts through so much noise. It shifts the conversation from what could happen to what's happening right now.

James: Right. K.E.V. is telling you the house is on fire, not just that the wiring looks a little frayed.

Katie: Precisely. The second force is this huge wave of regulatory accountability. This is what's pushing VM metrics all the way up to the C-suite and the board. I mean, look at NIST CSF 2.0. They added a brand new govern function.

James: Whole new function.

Katie: Yeah. And what that does is it elevates VM and says it now requires executive oversight and crucially measurable risk reduction. So VM metrics suddenly are board metrics.

James: And it's not just a best practice anymore, right? It's becoming a legal disclosure issue.

Katie: Absolutely. The SEC's new cyber disclosure rules are a game changer. Public companies now have to disclose a material incident within four business days.

James: Four days.

Katie: Four days. So think about the pressure. You cannot afford to waste time trying to figure out if some vulnerability was the root cause. You need tight, auditable handoffs from your VM program to your incident response team.

James: And if you don't have that, the lack of a good VM program becomes a liability in your SEC filing.

Katie: It's a material risk.

James: And what about Europe? The material we have suggests the pressure cooker is even hotter over there.

Katie: It is. The EU's Cyber Resilience Act, the CRA and NIS2, they expand the obligations dramatically. We're talking operational resilience, product security. If you sell any kind of connected product in the EU, you now have to prove its security posture through its entire life cycle. The burden of proof has shifted.

James: So they'll ask you, did you know about this exposure? And what did you do about it?

Katie: Exactly. And if you can't show that you had proactive control, the fines can be enormous. We're talking percentage-based fines of global turnover.

James: Wow. OK, so that's a tectonic shift. What's the third force? This one seems a bit different, less about speed and more about visibility.

Katie: It is. It's software supply chain transparency. SBOM, the software bill of materials, has gone from a nice-to-have to just table stakes. This was driven by things like the U.S. Executive Order 14-028 and FDA guidance for medical devices.

James: And a problem it solves is knowing what's in your software, right?

Katie: Exactly. If you can't track the individual components, the ingredients inside your applications, you have no way to patch them quickly when a new vulnerability like Log4j drops. The organizations that had S-bombs in place for Log4j, they knew instantly which apps were affected, the ones that didn't spend weeks just trying to find it. That's the difference between a near miss and a catastrophe.

James: That transition is so critical. So if we accept the backlog is overwhelming, the regulators are watching and speed is everything. The real question for a security leader is how do you decide what to fix first, especially when every tool is screening critical based on that old CVSS score?

Katie: You have to move beyond what we call CVSS only thinking. It's about risk informed prioritization now. A mature program blends multiple data points. So first, you still use CVSS. Version 4.0 is better. It has more fidelity. But that's just the base severity. Think of it as the static size of the hole in the wall. Second, and this is the real game changer, you layer on the exploit prediction scoring system, or EPSS. Yeah. It uses machine learning to generate a probability score, a number that tells you the likelihood of that specific vulnerability being exploited in the wild in the next 30 days.

James: That's a fantastic distinction. So CVSS tells you the cut is deep, but EPSS tells you if the attacker is likely to use that specific knife on you today. But if EPSS is such a game changer, why isn't everyone just using it? I mean, doesn't that require a ton of data science and integration work?

Katie: That's a great question. The data itself is actually public from an organization called FIRST. The challenge isn't the data science, it's the integration. Your tools, your VM platform, have to be able to pull that score in automatically, blend it with your own internal asset context. You know, is this thing on the internet? Is it a critical server? And then show that combined risk to the team that has to fix it. And then third, you fast track anything on the KEV list because, again, those aren't theoretical. They're proven threats.

James: So you blend all three, CZSS, EPSS, and KEV, and that cuts the critical list down to what actually matters this week.

Katie: It focuses your finite resources on the imminent threats, not the theoretical ones.

James: And this is where that prioritization logic starts feeding in to these bigger structural frameworks that are defining modern programs. Let's talk about the first one. CSF-aligned programs.

Katie: Right. Your VM program has to be outcome-led, and that means structuring it around NIST CSF 2.0. So you're mapping your metrics like mean time to resolution, MTTR, directly to those five functions. Identify, protect, detect, respond, and recover.

James: You have to show you're actually improving.

Katie: You do. And the second trend providing the operational backbone here is continuous threat exposure management. CTEM.

James: What's the elevator pitch on that one?

Katie: Gartner's CTEM model is basically the formal answer to that old quarterly scan problem. It's a continuous cycle. Scope, discover, prioritize, validate, and mobilize. The whole point is to focus remediation only on things that open a real, exploitable attack path to your most valuable assets. It forces you to constantly ask, did my fix actually break the attacker's path?

James: That sounds less like running a tool and more like operating a machine that's deeply integrated into the business. Which brings us to engineering. The source material talks a lot about secure by design. How is that changing things?

Katie: It's a foundational shift. Security requirements are being pushed way upstream into the development process itself. It's about eliminating entire classes of bugs, not just patching them one by one. CISA, for example, is now explicitly pushing vendors to use memory-safe programming languages.

James: Memory-safe software. That's a huge topic for developers, but why does it matter to a security leader who's just trying to manage volumes?

Katie: Because for decades, memory corruption bugs, things like buffer overflows, have been the source of the most severe, most exploitable vulnerabilities. We're talking about the bugs that lead to massive zero days. So now, VM leaders are actually tracking the engineering posture of their suppliers, the rewarding vendors that are actively adopting memory safe practices. It's a move from reactive patching to proactive design assurance. If you can eliminate the bug class, you don't need a patch for it later.

James: That's a huge lever to pull. And speaking of assurance, let's go back to the S-bomb for a second. How does that forced transparency actually make you faster in a crisis? Can you give us a concrete example?

Katie: Yeah, let's use log4j again. That crisis caused weeks of global panic. OK. So if your organization was mature with SBOMs using a standard format like SPDX or Cyclone DX, when that CVE dropped, your teams didn't have to scramble.

James: They didn't have to go hunting.

Katie: No. They just queried their SBOM data. They could instantly map every single impacted application, what version it had, and what compensating controls were already in place. They went from a week of triage down to a few hours. That speed is a massive competitive advantage.

James: That ability to correlate data so quickly brings us right to AI. Where does AI fit into this new blueprint?

Katie: AI is being used everywhere in this process, but the key is that smart leaders are pairing it with human governance. AI is fantastic at taking all these signals, EPSS, KEV, your internal asset tags, business criticality, and correlating them in near real time to give you a razor sharp ranked list. It compresses the analyst's triage time from days down to minutes.

James: That sounds like a great way to reduce burnout. But what's the risk? What happens when the AI gets it wrong and creates a false alarm?

Katie: That's the risk of hallucinated urgency, as we call it. Let's say your asset data is wrong. A test server gets tagged as a tier one production asset by mistake. The AI will see a vulnerability on it and flag it as a five alarm fire requiring an emergency change. That's why you have to pair AI correlation with human validation. AI sharpens the signal, but a human still has to own the final decision.

James: Okay, so let's put all these pieces together, the regulations, the new logic, the engineering push. Walk us through what the modern VM blueprint actually looks like in practice.

Katie: Right, this is basically CTEM operationalized. It starts with step one, scope and govern. This is where you set your business aligned objectives. You create measurable targets. Like what? Like we will remediate all KVs on tier one assets within 72 hours, or any exposure with an EPSS score over 0.7 gets fixed within seven days. This maps right back to that CSF 2.0 governance piece.

James: Okay. And the next steps, discover and prioritize. We've covered with SBOMS and the EPSKV blend. But the fourth step, validate, seems really critical. What's validation first fixing?

Katie: It's the step that closes the loop. In the old world, you'd mark a ticket done because a scanner said the patch was installed, but that only proves it was installed. Validation first fixing means you run an actual exploit check or a breach simulation to prove that the fix broke the attacker's path.

James: Ah, so you're not just checking that the lock was replaced. You're actually rattling the door to make sure it's locked and the window next to it isn't wide open.

Katie: Exactly. It provides that auditable evidence that the risk is actually gone, not just that a ticket was closed.

James: And the final step, mobilize. Sounds like the hardest part, getting people to actually do the work at the required speed.

Katie: This is all about human-centered orchestration. It's workflow integration. It means your VM tool has to talk seamlessly to JIRA or ServiceNow. You need to standardize your change advisory board, your CAB approvals, and crucially, you need to preauthorize emergency changes for those high priority KEV or high EPSS items.

James: Pre-authorizing. That's huge. That cuts out all the bureaucracy that usually causes the biggest delays.

Katie: Exactly. You're standardizing the response for a known imminent threat. It shrinks your time to mitigation dramatically without creating chaos because the process is already defined and approved.

James: So when you take this whole aggressive new blueprint to the board, what are the metrics that matter? What replaces that old misleading raw count of CVs?

Katie: The new metrics are all about measurable risk reduction, not just activity. So the biggest one is exposure burn down. This isn't about patches. It's the net reduction of exploitable paths to your most critical assets. It measures actual security gain. You also track KEV MTTR, your median time to resolution for known exploited volumes broken down by how critical the asset is. And finally, your validation pass rate. What percentage of your fixes actually broke the attack path? Those are the numbers that prove you're reducing the attacker's opportunity.

James: Let's connect this to specific industries because the pressure points are different. How does this play out in, say, finance versus health care?

Katie: In finance, it's all about those SEC disclosure rules. The key phrase is without unreasonable delay. So if you get breached through an old vulnerability that had a high EPSS score, you have to be able to prove under audit why you chose to fix something else first. Your VM data becomes critical evidence.

James: And in healthcare, you're dealing with patient safety and life critical devices.

Katie: Absolutely. So healthcare providers are now expected to prefer vendors who have memory safe roadmaps and clear SLAs for how they respond to a KEV. Then the hospital has to mirror that same discipline internally. An unpatched infusion pump isn't just a data risk. It's a patient safety risk. The FDA is driving this hard. And for government and critical infrastructure, they're bound by mandates like BOD 2201. They must automate KEV detection and tracking, and they're being pushed to prioritize vendors who adopt that memory safe guidance.

James: This is a fantastic map of the new landscape. To make it really actionable for everyone listening, let's leave them with one immediate, high-impact playbook they could start using tomorrow.

Katie: Okay, let's do Playbook A KEV First Hygiene. This is how you immediately shift your daily priorities. First, you pull the CISA KEV catalog every single day, ideally through an API, into your tools. Second, you automatically enrich any KEV findings with three pieces of context. Who owns the asset, is it exposed to the internet, and what is its business criticality tier? Third, and this is the speed part, you use automation to escalate any KEV that's internet-facing or has a high EPSS score, let's say, over 0.7 straight to an emergency change request. And finally, you close the loop. You validate the fix on a sample set with an exploit check to prove it worked. This aggressive, focused process ensures you are always tackling the most dangerous, proven threats first every day.

James: So the core idea we started with is crystal clear now. Modern vulnerability management is no longer a reactive, calendar-based task. It's a governed, outcome-led program that anticipates risk. It's an integrated machine designed to reduce exploitable paths, not just count vulnerabilities.

Katie: Exactly. And if you look at where this is all heading, the new mandate rewards vendors based on their security engineering posture, their memory safe roadmaps, their ability to provide fresh SBOMs. So the final thought for you, the listener, is this. If your risk mitigation is becoming more and more dependent on your supplier's transparency and their product quality, what strategic percentage of your company's security posture now lives entirely outside your own IT team? What part of it now rests on procurement discipline and vendor accountability? That changes everything.

1000+ members

Turn security converstains into remediation actions