{"id":3159,"date":"2025-06-11T12:53:38","date_gmt":"2025-06-11T10:53:38","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?post_type=tec_session&#038;p=3159"},"modified":"2025-06-12T10:04:12","modified_gmt":"2025-06-12T08:04:12","slug":"youve-scored-it-now-what-data-needs-for-effective-remediation","status":"publish","type":"tec_session","link":"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/","title":{"rendered":"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation"},"content":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p><p>Substantial effort goes into prioritizing which vulnerabilities to address, but the work of securing industrial environments\u2014and the need for information to support it\u2014doesn\u2019t stop there. Critical details of remediation options are often published in formats that are not machine-readable, hampering efforts at automation. This session will cover how remediation data differs from vulnerability data, the complexities and interdependencies of the landscape, and initiatives to standardize its reporting and distribution. Finally, it will discuss how this data can be used within an organization to support the vulnerability and patch management process.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><em>Technical Level: Intermediate<\/em><\/p>\n<p>This session will cover how remediation data differs from vulnerability data, the complexities and interdependencies of the landscape, and initiatives to standardize its reporting and distribution. Finally, it will discuss how this data can be used within an organization to support the vulnerability and patch management process.<\/p>\n","protected":false},"author":4,"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"session_track":[7],"session_location":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Technical Level: IntermediateThis session will cover how remediation data differs from vulnerability data, the complexities and interdependencies of the landscape, and initiatives to standardize its reporting and distribution. Finally, it will discuss how this data can be used within an organization to support the vulnerability and patch management process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-12T08:04:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/\",\"name\":\"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2025-06-11T10:53:38+00:00\",\"dateModified\":\"2025-06-12T08:04:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/","og_locale":"en_GB","og_type":"article","og_title":"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation - Industrial Security Conference Copenhagen","og_description":"Technical Level: IntermediateThis session will cover how remediation data differs from vulnerability data, the complexities and interdependencies of the landscape, and initiatives to standardize its reporting and distribution. Finally, it will discuss how this data can be used within an organization to support the vulnerability and patch management process.","og_url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-06-12T08:04:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/","url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/","name":"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2025-06-11T10:53:38+00:00","dateModified":"2025-06-12T08:04:12+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/youve-scored-it-now-what-data-needs-for-effective-remediation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"You\u2019ve Scored It \u2013 Now What? Data Needs for Effective Remediation"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3159"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/tec_session"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3159\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3159"}],"wp:term":[{"taxonomy":"tec_track","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_track?post=3159"},{"taxonomy":"tec_location","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_location?post=3159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}