From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsl...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=3o1-YLmMFqE



Duration: 0:00
1 views
0


Security teams often rely on scoring systems like Common Vulnerability Scoring System (CVSS), Exploit Prediction Scoring System (EPSS), and Stakeholder-Specific Vulnerability Categorization (SSVC) to make sense of vulnerability data—but these frameworks don’t always deliver the clarity needed to act. In this episode, Tod Beardsley, Vice President of Security Research at runZero, joins host Sean Martin at InfoSec Europe 2025 to challenge how organizations use these scoring systems and to explain why context is everything when it comes to exposure management.


Beardsley shares his experience navigating the limitations of vulnerability scoring. He explains why common outputs—like a CVSS score of 7.8—often leave teams with too many “priorities,” forcing them into ineffective, binary patch-or-don’t-patch decisions. By contrast, he highlights the real value in understanding factors like access vectors and environmental fit, which help security teams focus on what’s relevant to their specific networks and business-critical systems.


The conversation also explores SSVC’s ability to drive action through decision-tree logic rather than abstract scores, enabling defenders to justify priorities to leadership based on mission impact. This context-centric approach requires a deep understanding of both the asset and its role in the business—something Beardsley notes can be hard to achieve without support.


That’s where runZero steps in. Beardsley outlines how the platform identifies unmanaged or forgotten devices—including IoT, legacy systems, and third-party gear—without needing credentials or agents. From uncovering multi-homed light bulbs that straddle segmented networks to scanning for default passwords and misconfigurations, RunZero shines a light into the forgotten corners of corporate infrastructure.


The episode closes with a look at merger and acquisition use cases, where runZero helps acquiring companies understand the actual tech debt and exposure risk in the environments they’re buying. As Beardsley puts it, the goal is simple: give defenders the visibility and context they need to act now—not after something breaks.


Whether you’re tracking vulnerabilities, uncovering shadow assets, or preparing for your next acquisition, this episode invites you to rethink what visibility really means—and how you can stop chasing scores and start reducing risk.


Learn more about runZero: https://itspm.ag/runzero-5733


Note: This story contains promotional content. Learn more (https://www.itspmagazine.com/their-infosec-story) .


Guest: Tod Beardsley, Vice President of Security Research at runZero | On Linkedin: https://www.linkedin.com/in/todb/


Resources


Learn more and catch more stories from runZero: https://www.itspmagazine.com/directory/runzero


Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story


Keywords: sean martin, tod beardsley, runzero, exposure, vulnerability, asset, risk, ssdc, cvss, iot, brand story, brand marketing, marketing podcast, brand story podcast




Other Videos By ITSPmagazine


2025-06-10Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach with Steve Wright
2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe...
2025-06-10The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits Jemma Davis
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in ...
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in ...
2025-06-10From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | Infosecurity w/ Rob Black
2025-06-10Reframing | A Conversation with Frank Douglas | After 40 Podcast with Dr. Deborah Heiser
2025-06-10Reframing | A Conversation with Frank Douglas | After 40 Podcast with Dr. Deborah Heiser
2025-06-10Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Cyber Link
2025-06-10Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Euro...
2025-06-09From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsl...
2025-06-08The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash and the Human Cost of ...
2025-06-08The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash—Human Cost of Cybercrime
2025-06-08When Automation Meets Ethics, Budget, Data, and Risk: The Real Factors Behind AI Deployment | An ...
2025-06-08When Automation Meets Ethics, Budget, Data, and Risk: Real Factors Behind AI Deployment Andrea Isoni
2025-06-08The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash and the Human Cost of ...
2025-06-08Collaboration Isn’t Fluffy: It’s Fundamental to Cybersecurity—Rethinking the Role of Humans in Cy...
2025-06-08Collaboration Isn’t Fluffy: It’s Fundamental to Cybersecurity—Rethinking the Role of Humans in Cy...
2025-06-08Collaboration Isn’t Fluffy: It’s Fundamental to Cybersecurity—The Role of Humans in Cyber Defense
2025-06-08When Automation Meets Ethics, Budget, Data, and Risk: The Real Factors Behind AI Deployment | An ...
2025-06-05Episode 102 - My Interview with AADYA Geo Talks (Part II)