Hi [[ session.user.profile.firstName ]]

WhiteHat Security

  • Date
  • Rating
  • Views
  • Web Application Authorization and Authentication Explained
    Web Application Authorization and Authentication Explained Mike King, Technical Escalations Engineer, WhiteHat Security Recorded: Nov 15 2017 60 mins
    Join us to understand what happens when someone logs into a web application. Mike King, Technical Escalations Engineer for WhiteHat Security, will guide you through common access scenarios and vulnerabilities.

    By the end of this educational webinar, you’ll understand:
    -How web applications authenticate and authorize users
    -What can go wrong in the process
    -How to determine if you have a problem on your hands
  • 2017’s Biggest Breaches & Attacks: Why They Happened & How to Avoid
    2017’s Biggest Breaches & Attacks: Why They Happened & How to Avoid Ryan O’Leary, Chief Security Officer, WhiteHat Security Recorded: Nov 14 2017 56 mins
    2016 saw an all-time high of 4,100+ data breaches and over 4.2 billion records compromised. The bad news is that security attacks and incidents continue piling up in 2017. The good news is that you can take steps to protect your organization from experiencing the same fate of those exploited companies that make front-page news.

    In this webcast, Ryan O’Leary, Chief Security Research Officer, WhiteHat Security, dissects 2017’s biggest breaches and attacks, highlights lessons learned, and shares proven ways you can shore up your security posture.

    You’ll learn:

    •Why brand-name companies like Equifax and T-Mobile were compromised
    •How hackers gain access to organizations’ networks and most valuable assets
    •What your organization can do to identify vulnerabilities and avoid the same fate

    Register now to hear expert insights on the biggest threats of 2017 and best practices for protecting your organization going forward.

    Ryan O’Leary is the Chief Security Research Officer of the Threat Research Center and Technical Support at WhiteHat Security. He joined WhiteHat Security as an ethical hacker in 2007 and has since developed a breadth of experience finding and exploiting web application vulnerabilities and configuring automated tools for testing. Ryan manages a team of over 150 security engineers, based in three locations over two continents. He is also responsible for overseeing the delivery of WhiteHat Sentinel, which services over 10,000 customer websites. Under Ryan’s leadership, the team has built a one-of-a-kind database that combines details of more than 26M vulnerability patterns with proprietary algorithms to assess the threat level.
  • Secure Coding Practices: Avoiding SQL Injection Attacks
    Secure Coding Practices: Avoiding SQL Injection Attacks Zach Jones, Sr. Manager - TRC Static Code Analysis, WhiteHat Security Recorded: Jul 25 2017 57 mins
    SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. In this webinar, Zach Jones, senior manager for static code analysis from WhiteHat Security’s Threat Research Center, will discuss SQL injection attacks and how to best defend against them.

    In this webinar, we will:
    - Provide examples of vulnerable code
    - Discuss data boundary concepts between input and target interpreters
    - Explain the differences and advantages of using parameterized queries versus custom stored procedures
    - Discuss the pitfalls of using selective parameterization or trying to sanitize inputs by escaping or encoding them manually

    WhiteHat Security has extensive experience working with customers to identify and fix the latest web application vulnerabilities. Join us to gain a deeper understanding of common web application vulnerabilities, get expert technical advice on defensive tactics, and learn best practices to safeguard your apps from being exploited.
  • To IoT Security and Beyond!
    To IoT Security and Beyond! Setu Kulkarni, VP Product Management, WhiteHat Security Recorded: Jun 21 2017 48 mins
    The Internet of Things (IoT) is a strategic direction for 56% of the enterprises in the next two to three years*. For most people, the term IoT conjures up a wealth of opportunities and a vision of a hyper-connected world, but with great innovation comes a greater risk.

    - How do you keep ahead of the cyber threats surrounding these connected devices?
    - What are some of the biggest security challenges and how to address them?
    - How do you ensure the security of the sensitive data generated by your IoT devices?

    Join us in this webinar to learn about how you can combine IoT innovation with security strategies to protect the core and surrounding systems of IoT devices, including the web and mobile applications, servers, databases, and their integrations with other systems.
    * IDC Global 2016 Survey

    Presenter Bio
    As the Vice President of Product Management, Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
  • Thwarting Cybercrime in the Financial Services Sector
    Thwarting Cybercrime in the Financial Services Sector Ryan O'Leary, VP of Threat Reseach Center & Technical Support, WhiteHat Security Recorded: May 16 2017 45 mins
    Financial services industry has always had to deal with security risks and expensive data breaches because of regulatory fines and higher than average rate of lost business and customers. But with today’s continuously evolving cyber threat landscape, keeping up with regulatory compliance alone is not enough. Per the 2016 Verizon Data Breach Investigations Report, web application attacks are the Achilles heel for security, responsible for 82% of data breaches in the financial services sector. Join this session to learn more about cybercrime trends in financial services, and how a continuous application security assessment program can help financial service organizations improve their security posture and mitigate risk.
     
    In this webinar, we will discuss:
    • Current threat landscape for financial services organizations
    • Vulnerability statistics for financial services sector
    • How continuous application security testing can help your security and risk posture

    About the Presenter:
    Ryan O’Leary is Vice President of the Threat Research Center and Technical Support at WhiteHat Security, the specialized team of web application security experts. Ryan joined WhiteHat Security as an ethical hacker in 2007 and has since developed a breadth of experience finding and exploiting web application vulnerabilities and configuring automated tools for testing. Ryan swiftly rose through the ranks to become the Vice President of WhiteHat Security’s Threat Research Center in 2016. Reporting directly to CEO Craig Hinkley, Ryan now manages a team of over 150 security engineers. Under Ryan’s leadership, the team has built a one-of-a-kind database that combines details of more than 26 million vulnerability patterns with proprietary algorithms to assess the threat level.
  • Secure Your Leaky Mobile Apps: Discovery & Remediation
    Secure Your Leaky Mobile Apps: Discovery & Remediation Andrew Hoog, CEO of NowSecure & Setu Kulkarni, VP Product Management at WhiteHat Security Recorded: Apr 25 2017 55 mins
    Mobile devices are everywhere throughout the workplace, and outside the workplace, but mobile phone security as a discipline has been focused on parts of the solution such as WiFi connections, anti-virus and spyware. Mobile security apps are everywhere - but what are they securing? What is the actual security impact to your organization of insecure mobile app usage? For meaningful risk management, you need to understand both the qualitative and quantitative values of mobile security risk.

    Join WhiteHat Security and our technology partner NowSecure for a discussion on leaky apps, and how they can expose private and sensitive data - but more, what kind of data can be exposed.

    We’ll review how insecure mobile applications can create incidents, and how they impact the enterprise or organization. Finally, we will introduce you to the different ways WhiteHat can help you build mobile security into your larger DevSecOps and vulnerability management programs.

    About the Presenters:
    Andrew is the Co-founder and CEO of NowSecure. As a former CIO, Andrew has unique insight into solving enterprise mobile security problems and is driven by NowSecure’s mission to advance mobile security worldwide. He is responsible for the vision, strategy and growth of the company.

    Setu Kulkarni is the VP of Product Management at WhiteHat Security. Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
  • Applying Attacker Profile Knowledge to Vulnerability Management
    Applying Attacker Profile Knowledge to Vulnerability Management Ryan O'Leary, VP Threat Research Center & Technical Support, WhiteHat Security Recorded: Mar 14 2017 49 mins
    With cyber attacks on the rise, how can we apply our knowledge about attackers into better protecting our organizations? There are some key personas when it comes to who is attacking web sites. Everyone from teenagers to national agencies are hacking organizations via their websites now – 40% of the time. Each attacker has their own motivation and unique skills that they use to pull off quite different attacks. The type of persona most likely to attack your organization gives insight into the methods and suggested remedies.

    Join this session to learn:
    - How to identify your cyber attacker
    - How the identity of the attacker can guide crafting a security policy geared towards that threat
    - Best practices & use cases

    About the Presenter:
    Ryan O’Leary is VP of the Threat Research Center and Technical Support at WhiteHat Security, the specialized team of web application security experts. Ryan joined WhiteHat Security as an ethical hacker in 2007. Reporting directly to CEO Craig Hinkley, Ryan now manages a team of over 150 security engineers, based in three locations over two continents. He is also responsible for overseeing the delivery of WhiteHat Sentinel, which services over 10,000 customer websites. Under Ryan’s leadership, the team has built a one-of-a-kind database that combines details of more than 26 million vulnerability patterns with proprietary algorithms to assess the threat level.
  • Scaling Security at DevOps Speed
    Scaling Security at DevOps Speed Mike Goldgof, VP of Marketing at WhiteHat Security Recorded: Feb 21 2017 43 mins
    Seamlessly integrating AppSec testing into CI processes earlier in the SDLC has become the holy grail of DevOps and security teams. Achieving this means apps are not only more secure and can be deployed more quickly, but companies are also able to reap substantial cost and resource savings.

    Join Mike Goldgof, WhiteHat Security’s VP of Marketing, to learn about best practices and what’s needed to fit security testing into highly-automated Agile DevOps processes, that are transforming the development world and speed of delivery dictated by businesses today.
  • Internet and the Insecurity of Things | RSAC Live Panel
    Internet and the Insecurity of Things | RSAC Live Panel Chenxi Wang(Twistlock) Ryan O'Leary(WhiteHat) Josh Corman(AtlanticCouncil) Rich Mason(Critical Infra) Billy Rios(Whitescope) Recorded: Feb 14 2017 37 mins
    The Internet of Things (IoT) is rapidly changing the way we look at everything. The advantages we gain with smart devices are driving us to new levels of convenience in healthcare, manufacturing and automation, but IoT also presents many security challenges. So how do we efficiently manage thousands of devices? How do we effectively deal with mutual authentication? How do we know what is trustworthy and what is not? And most of all, how do we do this at a massive scale? This panel will explore the IoT challenges that we face and the solutions that we can implement today for a more secure future.

    The audience will learn:
    - How and why IoT is different than our classic, traditional IT environments
    - The current state of security and privacy in IoT and how it will impact individuals, homes, buildings, cities, states, and nations
    - What the future holds for security and privacy in our ever-evolving IoT world
    - The need for standards
    - Medical devices
    - Home automation
    - Connected cars
    - Smart cities

    Moderator:
    Chenxi Wang

    Panelists:
    Ryan O'Leary, VP Threat Research Center at White Hat Security
    Josh Corman, Director, Cyber Statecraft Initiative at Atlantic Council
    Rich Mason, President & Chief Security Officer, Critical Infrastructure
    Billy Rios, Founder of WhiteScope LLC
  • Getting the Sec into DevSecOps
    Getting the Sec into DevSecOps Scott Crawford and Anna Chiang Recorded: Jan 24 2017 45 mins
    Getting app development, DevOps and security teams all on the same page when it comes to implementing AppSec testing in development workflows is often a difficult task. Developers need to do frequent code releases to meet continuous integration (CI) process requirements. Adding security testing into this process is often met with resistance and poor adoption, unless it’s done correctly with the right security training, developer and CI tools integrations, and corporate security buy in by all involved.

    Join us as 451’s Scott Crawford and WhiteHat Security’s Anna Chiang discuss what’s needed to truly integrate security into a DevOps environment.

Embed in website or blog