Waiting for vulnerability alerts to secure your systems is a flawed strategy. Did you spend time tracking down and patching systems for meltdown, shellshock, and log4j? So did I. I've also probably helped you track your product EOLs by creating endoflife.date.
This talk takes all of my experience and focuses on a single core learning - you need to stop chasing CVEs.
Here's the core argument:
1. CVEs are Too Late: They're after-the-fact alerts. By the time you know, so do attackers.
2. Upgrading Isn't Always an Option: Real-world constraints often make immediate patching a pipe dream.
3. You Can't Patch Everything: Sometimes, technical or operational hurdles make it impossible to fix known vulnerabilities.
4. Regular Updates Are Key: Ditch the CVE chase. Regular, proactive updates are your best defence.
The remainder of the talk will go into specific threat models and why enforcing proactive updates is the cleanest strategy. It will also go into why this isn't a silver-bullet either, but needs to be practised alongside other defence in depth measures.