Rewriting the rules of exposure management

Vulnerability management is one of the oldest practices in security, yet it remains one of the most frustrating. The legacy model of scan-and-patch has stalled, leaving defenders buried under incomplete inventories, endless patch cycles, and rigid scoring systems that don’t reflect the messy reality of modern networks. Security teams now lean heavily on endpoint agents as the only workable solution, but agents cover barely half the problem; leaving unmanaged systems, shadow IT, and entire unknown networks in the dark.

This session examines why traditional approaches keep failing and why vendor hype and competing frameworks only add to the noise. Drawing on real-world lessons and attacker perspectives, it maps out the current coverage landscape, explains how detection methods differ, and explores the trade-offs between established tools and emerging techniques. 

Gain a pragmatic vision for the next generation of exposure management; a hybrid model that meets you where you are by combining cutting-edge research with open source innovation.

Meet Our Speakers

HD Moore

Founder & CEO

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Talks
Vulnerability haruspicy: picking out risk signals from scoring system entrails
Tod Beardsley explores the strengths and flaws of these systems, asking whether they improve risk decisions or simply rationalize them.
Talks
There and back again: discovering OT devices across protocol gateways with Rob King
Rob King discusses the security implications of the convergence of IT and OT, with deep dives into OT protocols and device discovery.
Talks
Charting the SSH multiverse with HD Moore (BSidesSF 2025)
Watch runZero founder HD Moore, explore the multitude of SSH implementations, their specific weaknesses, and real-world exposures.
Talks
NSEC keynote: a pirate's guide to snake oil & security - HD Moore
Watch HD's keynote at NSEC, where you are taken on a satirical voyage through the crowded world of vulnerability management.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.