Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

5 Steps to VEX Success: Managing the End-to-End Workflow

OWASP Foundation via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
Learn how to effectively manage vulnerability remediation with this 48-minute talk from the OWASP Foundation. Discover the five essential steps to implementing VEX (Vulnerability Exploitability eXchange) throughout your organization's vulnerability management lifecycle. Address the challenge of CVE overload—where security teams are overwhelmed by thousands of new vulnerabilities annually—by using VEX formats to communicate vulnerability impact status, exploitability in deployed contexts, and mitigation steps. Follow the complete workflow from vulnerability disclosure to VEX statement publication and distribution, gaining practical knowledge of the tools and processes needed for successful implementation. This presentation provides security practitioners with actionable strategies to improve remediation efficiency and strengthen their vulnerability management program.

Syllabus

5 Steps to VEX Success: Managing the End-to-End Workflow - Cortez Frazier Jr.

Taught by

OWASP Foundation

Reviews

Start your review of 5 Steps to VEX Success: Managing the End-to-End Workflow

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.