Corey Neskey's Avatar

Corey Neskey

@cneskey.bsky.social

Bayesian Cybersecuristician (Messages are generated by human and may be inaccurate or inappropriate.)

41 Followers  |  226 Following  |  29 Posts  |  Joined: 17.11.2024  |  1.9141

Latest posts by cneskey.bsky.social on Bluesky

Preview
Dependabot helps users focus on the most important alerts by including EPSS scores that indicate likelihood of exploitation, now generally available - GitHub Changelog Dependabot alerts now feature the Exploit Prediction Scoring System (EPSS) from the global Forum of Incident Response and Security Teams (FIRST), helping you better assess vulnerability risks. EPSS…

[Dependabot helps users focus on the most important alerts by including EPSS scores that indicate likelihood of exploitation, now generally available - GitHub Changelog](github.blog/changelog/20...)

06.06.2025 13:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

You can't predict the future but every important decision we make involves getting as close to it as we can. #grc #risk #crq #cybersecurity #prediction #GJP

28.05.2025 13:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

You're biased. Knowing you are is a start, but not enough. You don't need to openly admit you have a biased decision-making problem because every human 100% does. Fortunately establishing cognitive and technical routines works and tools and resources are available and even fun to use deriverisk.com

27.05.2025 21:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Cybersecurity effort decisions can very easily get in the way of innovation and progress. How much to compromise innovation in favor of cybersecurity is too fine a line for guesswork. That's basically why I'm obsessed with risk modeling in this space. #grc #risk #crq #cybersecurity

27.05.2025 13:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Cybersecurity risks are all tails but many risk analysts continue to use arithmetic mean to sum up the distribution of possibilities. #grc #risk #crq #cybersecurity

26.05.2025 21:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

How many data breaches can you afford to have in order to collect enough data points for statistical analysis? #grc #risk #crq #cybersecurity

26.05.2025 13:34 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Post image

What are event counts and statistics like #DBIR useful for in #Bayesian modeling? They provide what _may_ be valuable background information. #grc #risk #crq #cybersecurity

25.05.2025 19:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Procrastination can serve as a powerful tool in cybersecurity. By hesitating, experts allow themselves the time to gather crucial intelligence and understand the full scope of a threat before deciding on the most effective counteraction. Provided that's where the time goes. #grc #risk #crq

25.05.2025 15:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
What Works in Cybersecurity: Perimeter Security Appliances Which yes/no technical question of the form β€œDo you implement X” splits the world most successfully according to the likelihood of suffering a cyber incident? The perfect question would see none of…

Do you ask these questions when choosing what cybersecurity to fund?
- "How likely are we to implement and maintain this correctly?"
- "How likely is management to reduce future funding because of too much faith in this particular control?" #cybersecurity #risk #crq

19.05.2025 13:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

It's easier to sell risk assessment if the recommendations statements are specific and posed confidently and assertively. But that betrays the nature of chance and can be difficult to recover from when one's predicted futures fail to realize and the model isn't defensible in retrospect. #crq #risk

15.05.2025 21:33 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Statistics encode our observations of the past.
Probability encodes our beliefs about a static world.
Causality encodes under what conditions whether and how those probabilities may change.
In #riskassessment and #riskmanagement we use all three. Roughly as: historical data, estimates, and controls.

15.05.2025 13:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Most of the research into eliciting credible estimates comes from groups of experts and many, many rounds of iteration. For the few #risk professionals afforded the luxury of group estimates, there are still critical methodological practices to take into account when eliciting expert knowledge.

14.05.2025 21:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

This should sound familiar to anyone at an organization that neglects risk modeling and management or who experienced the damage of a parachute manager. #risk #riskmanagement #crq #pra #cybersecurity

14.05.2025 13:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Games likes chess force you to face the facts about your skill but poker forces you to face the fact that both luck and skill are at play. A training ground much closer to real life. #risk #crq #pra #riskmanagement #riskassessment #poker

13.05.2025 21:02 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

#audit culture from a timeless classic on #Bureaucracy that any #grc or #cybersecurity pro would relate to. It's relatively short read and full of spice and shade throwing.

13.05.2025 13:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Risk modeling has a complex and fascinating history across cultures. If you're feeling disenchanted or burnt out as a risk or grc practitioner, consider books like these to breathe new life into your work. #grc #riskmanagement #crq #riskassessment #pra #cybersecurity

12.05.2025 21:39 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

#riskmanagement #riskassessment #crq #pra

10.05.2025 15:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image 09.05.2025 21:03 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

If your reality has a lot of uncertainty so should your model.

09.05.2025 13:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

If your attempts at assessing risk in cybersecurity or the enterprise are met with hostility you shouldn't be surprised. Nobody wants their idea on a piece of paper with only the downsides. Benefits should always be included in risk assessment reports and risk management decisions. #riskmanagement

08.05.2025 21:33 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

This is one of those insights that seems obvious when you read it but seems to slip through the cracks as a priority for analysts and decision makers requesting their analysis. #riskmanagement #riskassessment #crq #pra

08.05.2025 13:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

The number of risk scenarios you model and monitor is worth paying attention to. You have finite resources which is why you're doing risk management but you also have finite resources to manage risk. #riskmanagement #riskassessment #crq #pra

07.05.2025 21:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

To me, this is what risk modeling is all about. Thoroughly conscious ignorance. Once you start making explicit your knowns and unknowns you begin to learn at a systemic scale.

07.05.2025 13:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

You model risk but are you modeling the risk of controls? How did you model the risk of using LastPass against its benefits? What about the risk that redundancies introduce?

06.05.2025 21:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Four days after Kennedy’s inauguration, a SAC B-52 disintegrated in midflight. One of its two 24-megaton hydrogen bombs smashed into a swamp near Goldsboro, North Carolina, and a large chunk of enriched uranium sank more than 50 feet, where it presumably remains to this day.

06.05.2025 13:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image 05.05.2025 21:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
DOJ Will Push Google to Sell off Chrome to Break Search Monopoly Top Justice Department antitrust officials have decided to ask a judge to force Alphabet Inc.’s Google to sell off its Chrome browser in what would be a historic crackdown on one of the world’s bigges...

[DOJ Will Push Google to Sell Chrome to Break Search Monopoly - Bloomberg](www.bloomberg.com/news/article...)
- archive.is/vePVT

19.11.2024 12:29 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

I love that infosec bluesky is growing so much. I miss the old infosec twitter.

17.11.2024 16:18 β€” πŸ‘ 371    πŸ” 30    πŸ’¬ 33    πŸ“Œ 4
A fledgling bird with comical features like eyebrow tufts and pink lip like beak.

A fledgling bird with comical features like eyebrow tufts and pink lip like beak.

Rare photo of Freddie Jones playing the Mentat Thufir Hawat in 1984 #Dune. #Birds

17.11.2024 23:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A panoramic photo of the Potomac River with the Washington Monument on the right side and Georgetown waterfront of the left.

A panoramic photo of the Potomac River with the Washington Monument on the right side and Georgetown waterfront of the left.

17.11.2024 23:26 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@cneskey is following 20 prominent accounts