Transcript
A (0:05)
You're listening to the RSA Conference podcast,
B (0:07)
Where the world talks security.
A (0:13)
Hello, listeners. Welcome to this edition of our RSAC podcast series. Thank you for tuning in. I'm Tatiana Sanchez. And I'm Casey Zirkis, and we are your RSAC podcast hosts. Casey, what are we going to discuss today?
C (0:30)
Well, Tatiana, I don't know. Well, I do know that you pay very close attention to cybersecurity news, as do I. And according to many news articles and even industry reports that came out in 2025, we're seeing that more than half of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. So organizations clearly are struggling to get ahead of vulnerabilities and move past vulnerability debt. But even with the help of resources like CISA's known exploited vulnerabilities catalog, there are still challenges. And that's why we're excited to be joined today by Steve Osepic, who will share actionable strategies on how organizations can manage their vulnerability program and start driving significant risk reductions to truly get ahead.
A (1:34)
And before we get started, we do want to remind our listeners that here at RSAC we host podcasts twice a month. And we encourage you to subscribe, rate and review us on your preferred podcast app so that you can be notified when new tracks are posted. And now we would like to ask our guest to formally introduce himself before we dive in. Steve.
B (1:54)
Hi. Great to talk to you today. I am Steve Osepic. I am the managing director at CRO that's leading our threat exposure management practice.
A (2:04)
Thanks, Steve.
D (2:05)
And thanks for taking the time to join us today. I want to first start off by asking, how are vulnerabilities weaponized and what are the true common exploit techniques being used by threat actors today?
B (2:18)
Absolutely. And what's not commonly known is just how much of a market there is behind this weaponization. Probably a good way to approach it. And if you think about those techniques like it's getting into the shoes of somebody that's trying to break into a system. Let's say that we're threat actors and we want to create an exploit kit and we want to make money off this. Right. We want to sell this and other folks will use this exploit kit in this fantasy world to actually perform our campaigns and sell this to folks who want to break into systems. Right. And so what are the things we're going to think about in that world? We're talking about weaponization prevalence. If we're looking at different vulnerabilities that we could potentially or different areas of Study where we could create this exploit code. We're going to look at what's on the Internet, what is exposed, what are folks using, what types of software, what platforms. Another thing we might look at is the obscurity. Are we going to get caught? Is it something that maybe hasn't had attention in some time that we could focus on and get a lot of potential targets? Is there something that we can focus on and target that other folks aren't looking at? And another one is reliability. Is this exploit code going to work? Can we test it? Can we get it to run the same way every time? Right. So these are all things that we're going to think about. And from a techniques perspective, a lot of these vulnerabilities, the work is done for us from a threat actor perspective in the form of things like CVEs, vulnerabilities, things that are published. So our job, one thing we don't care about as threat actors is art or style points, maybe a little. But truly what we're looking for is that place, that intersection of something that's very prevalent, hard to detect and easily targeted. And what we're seeing, you mentioned that 48 hours number. There are a combination of these things we have access to as threat actors. We could either target things that are just coming out for which they don't have detection yet, like you said, the 48 hour time, that's one way to do it. And you get that window of time as a threat actor before the defenses have caught it. We sometimes refer to those as zero days. Right. But the other side of this that I see as well is on the backlog, they might target something from five, 10 years ago that's also still prevalent, that's also still out there. So a lot of money changes hands during that period, you know, from the time when a threat actor targets a vulnerability to when they actually cash in on it. And that's what really decides what things get targeted in the market.
