Vulnerability haruspicy: using woo to confirm your biases (NorthSec 25)

Vulnerability scoring is supposed to bring order to the chaos of risk management, but in practice, it can feels more like reading tarot cards or poking at entrails than applying science. CVSS performs monkey math to force fractal bell curves, EPSS tries to predict exploitation with statistical black magicks, and SSVC ditches math entirely in favor of structured gut feelings.

Meanwhile, defenders mix and match shortcuts — KEV lists, vendor advisories, and lived experience — to separate the truly urgent from the merely annoying. But are we actually making better risk decisions, or just using these frameworks to justify what we were going to do anyway?

This talk digs into the strengths, weaknesses, and absurdities of CVSS, EPSS, and SSVC, comparing them to the reality of how security teams actually handle vulnerabilities. Tod explores where these models help, where they mislead, and whether any of them are meaningfully better than rolling a D20 saving throw vs exploitation.

Meet Our Speakers

todb

Vice President of Security Research

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Talks
Forging strong cyber communities in uncertain times
HD Moore and Nicole Schwartz explore what it takes to create and foster robust cybersecurity communities and why we should all get involved in...
Talks
Vulnerability haruspicy: picking out risk signals from scoring system entrails
Tod Beardsley explores the strengths and flaws of these systems, asking whether they improve risk decisions or simply rationalize them.
Talks
Rewriting the rules of exposure management
HD Moore examines why traditional vulnerability management tools continue to fail and why vendor hype and competing frameworks only add to the noise
Talks
There and back again: discovering OT devices across protocol gateways with Rob King
Rob King discusses the security implications of the convergence of IT and OT, with deep dives into OT protocols and device discovery.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.