Resilient Cyber cover image

S5E3: Patrick Garrity - Vulnerability Research, Management and Visualizations

Resilient Cyber

00:00

Determining Vulnerabilities for the CAV List and Community Building

This chapter explores the process of selecting vulnerabilities for the Common Vulnerabilities and Exposures (CAV) list, including the use of reputable sources and the challenges faced by CISA in creating a comprehensive list.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app