SlideShare ist ein Scribd-Unternehmen logo
1 von 14
And why the LIR is a key factor
M. Steltman - RIPE79 – 16-10-2019
The compelling case for vulnerability
management
Why are we vulnerable ?
“We are vulnerable, because hard- and software has vulnerabilities.
The bad guys find them and use them for themselves.
So we need good guys to find them too, and then fix those leaks. It’s all
we have”
Bruce Schneier
So, why don’t we just patch?
4
The patching process for companies
explained
5
?
Sounds easy but hard to achieve 100%
6
?
Too much to deal with
7
8
Digital
Infrastructure,
Including LIRs
Companies
with digital
presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment
Digital
Services
Plan B: Coordinated responsible disclosure / Bug bou
Common
approach:
“Motivate”
Add:
Find and
report
Coordinated responsible disclosure
=> towards: CRD on steroids
10
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
Crawl and
scan
networks
Add
performance
information
Collect and
aggregate
Forward
&
Policy
Members & Constituents of:
What can and should LIRs do?
11
** Where does LIR responsibility start and stop **?
-> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting
this going
This goes way beyond ISP abuse mitigation!
-LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”:
- Monitor: Which badness is visible in my networks: vulnerabilities and
abuse
- Receive: Subscribe to feeds, receive abuse- and vulnerability
information
- Triage: Who has the actual problem, which user or
cusromer?
- Forward: Who can and should fix this?
- Policy: “motivate” users / customers to act, or act yourself
Questions for RIPE community / LIRs
12
- Do you agree that this “actual vulnerability”approach can be very effective?
- Do you agree that the LIR is a key middleman in this approach?
Concrete actions for such LIRs, what can you already do NOW:
- Start with this mindset
- Update your policies, accept code of conduct NtD and Abuse
- Be reachable !
- Subscribe to offered aggregated feeds
- Forward info and act , to customers / users
- Using standard OSS systems such as Abuse-IO
• If this initiative will start, are YOU prepared to participate ?
13
The current approach : motivate companies to patch 100%, is insufficient
The solution: Find ACTUAL leaks, aggregate, add performance info
Then forward to those who can fix– or who can make someone fix
In NL:
All we need is already there! Just need to go on steroids
Gov: (NCSC): please take the lead, connect the dots
Providers / LIRS: Adopt the CoC , connect to NBIP and start making a
difference
In your country: replicate the model
** It is time to act, now! **
Stichting
Digitale Infrastructuur
Nederland
www.dinl.nl

Weitere ähnliche Inhalte

Ähnlich wie LIR's key role in vulnerability management

TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookTomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookBrian F. Eddy
 
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...Business Development Institute
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Femke Goedhart
 
If you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionIf you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionSuzanne Livingston
 
12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App BriefScott Hague
 
How to sell the vision & value of online community
How to sell the vision & value of online communityHow to sell the vision & value of online community
How to sell the vision & value of online communityGet Satisfaction
 
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)SMASH Summit
 
The 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary FindingsThe 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary FindingsLeader Networks
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Continuity and Resilience
 
Whitepaper interview with pam morris
Whitepaper  interview with pam morrisWhitepaper  interview with pam morris
Whitepaper interview with pam morrisComputer Aid, Inc
 
Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014CambsChamber
 
Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018Lora Cecere
 
Transforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs BuyTransforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs Buyibi
 
Argyle CMO Summit 2015
Argyle CMO Summit 2015 Argyle CMO Summit 2015
Argyle CMO Summit 2015 Mathew Sweezey
 
Collaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social BusinessCollaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social BusinessPerficient, Inc.
 
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...Suma Kamadod
 
Advanced demand supply integration
Advanced demand supply integrationAdvanced demand supply integration
Advanced demand supply integrationarmyguy1994
 
??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)Bob Prieto
 

Ähnlich wie LIR's key role in vulnerability management (20)

TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-LookTomkinsInternational-SCLF-8-12-2015-Last-Final-Look
TomkinsInternational-SCLF-8-12-2015-Last-Final-Look
 
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
Actiance Presentation - BDI 7/26/2011 Social Media Security & Compliance Work...
 
Digital disruption – dive in to thrive
Digital disruption – dive in to thriveDigital disruption – dive in to thrive
Digital disruption – dive in to thrive
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 
Interview with pam morris
Interview with pam morrisInterview with pam morris
Interview with pam morris
 
If you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionIf you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoption
 
12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief12 Items You Need To Include In Your Mobile Healthcare App Brief
12 Items You Need To Include In Your Mobile Healthcare App Brief
 
How to sell the vision & value of online community
How to sell the vision & value of online communityHow to sell the vision & value of online community
How to sell the vision & value of online community
 
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
Four Laws of Social Business (Jeremiah Owyang, Altimeter Group)
 
The 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary FindingsThe 2013 Social Business Benchmark Preliminary Findings
The 2013 Social Business Benchmark Preliminary Findings
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
 
Whitepaper interview with pam morris
Whitepaper  interview with pam morrisWhitepaper  interview with pam morris
Whitepaper interview with pam morris
 
Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014Lessons Learned by Social Businesses, 10 June 2014
Lessons Learned by Social Businesses, 10 June 2014
 
Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018Building a Digital Supply Chain - report - 9 APR 2018
Building a Digital Supply Chain - report - 9 APR 2018
 
Transforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs BuyTransforming Healthcare: Build vs Buy
Transforming Healthcare: Build vs Buy
 
Argyle CMO Summit 2015
Argyle CMO Summit 2015 Argyle CMO Summit 2015
Argyle CMO Summit 2015
 
Collaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social BusinessCollaboration Excellence: Strategies for Enabling a Social Business
Collaboration Excellence: Strategies for Enabling a Social Business
 
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
GENERAL MANAGEMENT - Marsha feels that there must be a better way to conduct ...
 
Advanced demand supply integration
Advanced demand supply integrationAdvanced demand supply integration
Advanced demand supply integration
 
??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)??? (Rutgers Innovation Key Note)
??? (Rutgers Innovation Key Note)
 

Kürzlich hochgeladen

办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 

Kürzlich hochgeladen (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 

LIR's key role in vulnerability management

  • 1. And why the LIR is a key factor M. Steltman - RIPE79 – 16-10-2019 The compelling case for vulnerability management
  • 2.
  • 3. Why are we vulnerable ? “We are vulnerable, because hard- and software has vulnerabilities. The bad guys find them and use them for themselves. So we need good guys to find them too, and then fix those leaks. It’s all we have” Bruce Schneier
  • 4. So, why don’t we just patch? 4
  • 5. The patching process for companies explained 5 ?
  • 6. Sounds easy but hard to achieve 100% 6 ?
  • 7. Too much to deal with 7
  • 8. 8 Digital Infrastructure, Including LIRs Companies with digital presence Financial servicesManufacturing Logistics Healthcare Retail MobilityGovernment Digital Services Plan B: Coordinated responsible disclosure / Bug bou Common approach: “Motivate” Add: Find and report
  • 10. => towards: CRD on steroids 10 Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan Crawl and scan networks Add performance information Collect and aggregate Forward & Policy Members & Constituents of:
  • 11. What can and should LIRs do? 11 ** Where does LIR responsibility start and stop **? -> LIR is NOT responsible, but is (as other intermediaries) a key actor in getting this going This goes way beyond ISP abuse mitigation! -LIR ( as ISP, hoster, CSP) is a key actor , the essential “middle man”: - Monitor: Which badness is visible in my networks: vulnerabilities and abuse - Receive: Subscribe to feeds, receive abuse- and vulnerability information - Triage: Who has the actual problem, which user or cusromer? - Forward: Who can and should fix this? - Policy: “motivate” users / customers to act, or act yourself
  • 12. Questions for RIPE community / LIRs 12 - Do you agree that this “actual vulnerability”approach can be very effective? - Do you agree that the LIR is a key middleman in this approach? Concrete actions for such LIRs, what can you already do NOW: - Start with this mindset - Update your policies, accept code of conduct NtD and Abuse - Be reachable ! - Subscribe to offered aggregated feeds - Forward info and act , to customers / users - Using standard OSS systems such as Abuse-IO • If this initiative will start, are YOU prepared to participate ?
  • 13. 13 The current approach : motivate companies to patch 100%, is insufficient The solution: Find ACTUAL leaks, aggregate, add performance info Then forward to those who can fix– or who can make someone fix In NL: All we need is already there! Just need to go on steroids Gov: (NCSC): please take the lead, connect the dots Providers / LIRS: Adopt the CoC , connect to NBIP and start making a difference In your country: replicate the model ** It is time to act, now! **

Hinweis der Redaktion

  1. And again: we are vulnerable. Very vulnerable. VPns vulnerabilities: as if your staff entry is open for everybody Our scientific councel has said it: this van lead to diusrutions of society. What is vital and what not. Anything can turn out to be vital if it is donw or compromised long enough It reall, is time to act. But how?
  2. I was on a OECD congres last year, with Nelly, inspired by bruce. He made the matter very simple. Let start with the technology. It is nog the only thing, but if that;s not safe,
  3. Our approach: complain about vulnerabiloiies, strong language: we must patch, whi do;t we do it ? And if you don;t, you are apparently neglicent and lazy. Shame on you? Is it thast simple?
  4. Let take a look at how it works. It sounds easy enough: Know your software Crawl the CVE database Go to your supplier Update and patch your systems done. We are all a lot safer!
  5. But is hard, and cumvbersome,e VCE has 20000 entries, Huge task to know your inventor and know when to patch. Easy to overlook one. vendos don;t always supply patches. And llots of your technologies atre with third parties, your hosters, SaaS providers. They can overloop patches too.
  6. To make things worse, patching breaks things. Lots of outages are caused by patching And then the minister will say “I am going to ibtervene with companies who don’t manage their availability ? There are too many patches to keep up with Patching is a manual, time consuming process Lack of resources Some applications can’t be patched End user resistance Patching breaks things
  7. Plan B: scan for things you see from the Internet. Act as the bad guys do. Then report to the compny who can fix this
  8. So here is the plan: Put RD on steroids. It is a simple formula, that many of you recognize from other problems. Scan Forward and aggregate Add: sticks and carrots Then: send to those who do not have the problemj themselves, but KNOW who hasve the problem. LIR’s, hosters, providers. They KNOW whio is reponsible, understand the technical details, can formulate the right call to action.