Prioritizing the 1%: How to Focus on the Vulnerabilities That Actually Get Exploited

Senior Solutions Engineer, ThreatConnect

00:00

/

00:00

Most CVEs won’t hurt you, but the few that do, can be devastating. This talk focuses on how to identify and act on the vulnerabilities that actually get exploited, with examples pulled from recent ransomware and APT campaigns. Learn how to prioritize based on threat actor behavior, not just CVSS.

With over 20,000 CVEs published annually, most organizations struggle to separate signal from noise. Yet only a tiny fraction—less than 2%, are ever exploited in the wild. Today we'll cut through the volume to show how federal and enterprise teams can prioritize vulnerabilities based on adversary behavior, exploit availability, and real-world threat intelligence. We’ll explore how public and commercial data sources can be operationalized to focus on high impact threats and walk through recent examples of CVEs leveraged by ransomware groups and APTs.

The goal: fewer false positives, better resource allocation, and stronger defenses where they matter most.

Key Takeaways:

  • Understand why most CVEs are never exploited and how to spot the ones that will be
  • Learn how to use CISA KEV, Exploit Prediction Scoring System (EPSS), and threat intel feeds for prioritization
  • Get a practical framework for integrating exploitability risk into your vulnerability management process
  • See case studies of recent high-impact CVEs that bypassed traditional prioritization models

A Movement to Counter Emerging Threats.

This is some text inside of a div block.
The SESSIONS
This is some text inside of a div block.
The SESSIONS
This is some text inside of a div block.

00:00

/

00:00

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript