The Devil Steals Prada: The Cost of Business Logic Flaws
This presentation will demonstrate the value of manual business logic assessments and provide an example of a vulnerability that scanners cannot find because the problem isn’t in the code or framework.
We will provide a real life instance of a business logic flaw at a major high-end clothing retailer. The flaw allowed malicious users to purchase negative amounts of expensive merchandise, and credit thousands of dollars to their accounts.
RecordedOct 15 201534 mins
Your place is confirmed, we'll send you email reminders
IoT is made up of Microservices and APIs, making them quick to implement and churn out into production. But are they secure? We will look at the challenges a user of the IoT should be aware of, and what checklists can a programmer use for best practices in IoT development.
In the past year, we’ve seen a litany of ransomware attacks – Petya, WannaCry, Bad Rabbit and many others. Everything from small businesses to large scale cyber-attacks against large financial and healthcare companies have been impacted.
The issue with Ransomware isn’t new. This type of exploit has existed for some time, leaving systems across the world inaccessible with messages that no one wants to see: ‘pay me or else’. Ransomware is an issue but one that can be avoided if companies take the right approach.
Will this trend continue in 2018? Join Jessica Marie, Security Evangelist at WhiteHat Security to learn the ways you can protect your organization against ransomware.
Register for this webinar to learn:
• What to look for in ransomware attacks
• Training recommendations for both development and security organizations
• The importance of system backups
• How to test your web applications for vulnerabilities that would allow outsiders to upload malicious files
Jeannie Warner, Security Manager, WhiteHat Security and Kurt Risley, Security Architect
GDPR is coming and anyone doing business with the EU will need a Data Officer to determine their data strategy.
With a third of all attacks coming in against web applications, mapping the data flows through those applications is required to satisfy due diligence in securing your customer data, EU citizen data, and is a good exercise in general to protect your own intellectual property.
In this talk, Jeannie Warner, Security Manager and Kurt Risley, Security Architect at WhiteHat Security will offer best application security practices for data in the following categories:
- Data Classification - how secure does it need to be?
- Data Categorization - which regulations will apply?
- Data Rules - what kinds of repeatable policies should be applied?
- Data Mapping - identify the flow from database to applications to client apps via APIs
- Data Securing - showing the best practices for securing the applications by use cases
Mike King, Technical Escalations Engineer, WhiteHat Security
Join us to understand what happens when someone logs into a web application. Mike King, Technical Escalations Engineer for WhiteHat Security, will guide you through common access scenarios and vulnerabilities.
By the end of this educational webinar, you’ll understand:
-How web applications authenticate and authorize users
-What can go wrong in the process
-How to determine if you have a problem on your hands
Ryan O’Leary, Chief Security Officer, WhiteHat Security
2016 saw an all-time high of 4,100+ data breaches and over 4.2 billion records compromised. The bad news is that security attacks and incidents continue piling up in 2017. The good news is that you can take steps to protect your organization from experiencing the same fate of those exploited companies that make front-page news.
In this webcast, Ryan O’Leary, Chief Security Research Officer, WhiteHat Security, dissects 2017’s biggest breaches and attacks, highlights lessons learned, and shares proven ways you can shore up your security posture.
•Why brand-name companies like Equifax and T-Mobile were compromised
•How hackers gain access to organizations’ networks and most valuable assets
•What your organization can do to identify vulnerabilities and avoid the same fate
Register now to hear expert insights on the biggest threats of 2017 and best practices for protecting your organization going forward.
Ryan O’Leary is the Chief Security Research Officer of the Threat Research Center and Technical Support at WhiteHat Security. He joined WhiteHat Security as an ethical hacker in 2007 and has since developed a breadth of experience finding and exploiting web application vulnerabilities and configuring automated tools for testing. Ryan manages a team of over 150 security engineers, based in three locations over two continents. He is also responsible for overseeing the delivery of WhiteHat Sentinel, which services over 10,000 customer websites. Under Ryan’s leadership, the team has built a one-of-a-kind database that combines details of more than 26M vulnerability patterns with proprietary algorithms to assess the threat level.
SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. In this webinar, Zach Jones, senior manager for static code analysis from WhiteHat Security’s Threat Research Center, will discuss SQL injection attacks and how to best defend against them.
In this webinar, we will:
- Provide examples of vulnerable code
- Discuss data boundary concepts between input and target interpreters
- Explain the differences and advantages of using parameterized queries versus custom stored procedures
- Discuss the pitfalls of using selective parameterization or trying to sanitize inputs by escaping or encoding them manually
WhiteHat Security has extensive experience working with customers to identify and fix the latest web application vulnerabilities. Join us to gain a deeper understanding of common web application vulnerabilities, get expert technical advice on defensive tactics, and learn best practices to safeguard your apps from being exploited.
The Internet of Things (IoT) is a strategic direction for 56% of the enterprises in the next two to three years*. For most people, the term IoT conjures up a wealth of opportunities and a vision of a hyper-connected world, but with great innovation comes a greater risk.
- How do you keep ahead of the cyber threats surrounding these connected devices?
- What are some of the biggest security challenges and how to address them?
- How do you ensure the security of the sensitive data generated by your IoT devices?
Join us in this webinar to learn about how you can combine IoT innovation with security strategies to protect the core and surrounding systems of IoT devices, including the web and mobile applications, servers, databases, and their integrations with other systems.
* IDC Global 2016 Survey
As the Vice President of Product Management, Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
Ryan O'Leary, VP of Threat Reseach Center & Technical Support, WhiteHat Security
Financial services industry has always had to deal with security risks and expensive data breaches because of regulatory fines and higher than average rate of lost business and customers. But with today’s continuously evolving cyber threat landscape, keeping up with regulatory compliance alone is not enough. Per the 2016 Verizon Data Breach Investigations Report, web application attacks are the Achilles heel for security, responsible for 82% of data breaches in the financial services sector. Join this session to learn more about cybercrime trends in financial services, and how a continuous application security assessment program can help financial service organizations improve their security posture and mitigate risk.
In this webinar, we will discuss:
• Current threat landscape for financial services organizations
• Vulnerability statistics for financial services sector
• How continuous application security testing can help your security and risk posture
About the Presenter:
Ryan O’Leary is Vice President of the Threat Research Center and Technical Support at WhiteHat Security, the specialized team of web application security experts. Ryan joined WhiteHat Security as an ethical hacker in 2007 and has since developed a breadth of experience finding and exploiting web application vulnerabilities and configuring automated tools for testing. Ryan swiftly rose through the ranks to become the Vice President of WhiteHat Security’s Threat Research Center in 2016. Reporting directly to CEO Craig Hinkley, Ryan now manages a team of over 150 security engineers. Under Ryan’s leadership, the team has built a one-of-a-kind database that combines details of more than 26 million vulnerability patterns with proprietary algorithms to assess the threat level.
Andrew Hoog, CEO of NowSecure & Setu Kulkarni, VP Product Management at WhiteHat Security
Mobile devices are everywhere throughout the workplace, and outside the workplace, but mobile phone security as a discipline has been focused on parts of the solution such as WiFi connections, anti-virus and spyware. Mobile security apps are everywhere - but what are they securing? What is the actual security impact to your organization of insecure mobile app usage? For meaningful risk management, you need to understand both the qualitative and quantitative values of mobile security risk.
Join WhiteHat Security and our technology partner NowSecure for a discussion on leaky apps, and how they can expose private and sensitive data - but more, what kind of data can be exposed.
We’ll review how insecure mobile applications can create incidents, and how they impact the enterprise or organization. Finally, we will introduce you to the different ways WhiteHat can help you build mobile security into your larger DevSecOps and vulnerability management programs.
About the Presenters:
Andrew is the Co-founder and CEO of NowSecure. As a former CIO, Andrew has unique insight into solving enterprise mobile security problems and is driven by NowSecure’s mission to advance mobile security worldwide. He is responsible for the vision, strategy and growth of the company.
Setu Kulkarni is the VP of Product Management at WhiteHat Security. Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
Ryan O'Leary, VP Threat Research Center & Technical Support, WhiteHat Security
With cyber attacks on the rise, how can we apply our knowledge about attackers into better protecting our organizations? There are some key personas when it comes to who is attacking web sites. Everyone from teenagers to national agencies are hacking organizations via their websites now – 40% of the time. Each attacker has their own motivation and unique skills that they use to pull off quite different attacks. The type of persona most likely to attack your organization gives insight into the methods and suggested remedies.
Join this session to learn:
- How to identify your cyber attacker
- How the identity of the attacker can guide crafting a security policy geared towards that threat
- Best practices & use cases
About the Presenter:
Ryan O’Leary is VP of the Threat Research Center and Technical Support at WhiteHat Security, the specialized team of web application security experts. Ryan joined WhiteHat Security as an ethical hacker in 2007. Reporting directly to CEO Craig Hinkley, Ryan now manages a team of over 150 security engineers, based in three locations over two continents. He is also responsible for overseeing the delivery of WhiteHat Sentinel, which services over 10,000 customer websites. Under Ryan’s leadership, the team has built a one-of-a-kind database that combines details of more than 26 million vulnerability patterns with proprietary algorithms to assess the threat level.
Mike Goldgof, VP of Marketing at WhiteHat Security
Seamlessly integrating AppSec testing into CI processes earlier in the SDLC has become the holy grail of DevOps and security teams. Achieving this means apps are not only more secure and can be deployed more quickly, but companies are also able to reap substantial cost and resource savings.
Join Mike Goldgof, WhiteHat Security’s VP of Marketing, to learn about best practices and what’s needed to fit security testing into highly-automated Agile DevOps processes, that are transforming the development world and speed of delivery dictated by businesses today.
Chenxi Wang(Twistlock) Ryan O'Leary(WhiteHat) Josh Corman(AtlanticCouncil) Rich Mason(Critical Infra) Billy Rios(Whitescope)
The Internet of Things (IoT) is rapidly changing the way we look at everything. The advantages we gain with smart devices are driving us to new levels of convenience in healthcare, manufacturing and automation, but IoT also presents many security challenges. So how do we efficiently manage thousands of devices? How do we effectively deal with mutual authentication? How do we know what is trustworthy and what is not? And most of all, how do we do this at a massive scale? This panel will explore the IoT challenges that we face and the solutions that we can implement today for a more secure future.
The audience will learn:
- How and why IoT is different than our classic, traditional IT environments
- The current state of security and privacy in IoT and how it will impact individuals, homes, buildings, cities, states, and nations
- What the future holds for security and privacy in our ever-evolving IoT world
- The need for standards
- Medical devices
- Home automation
- Connected cars
- Smart cities
Ryan O'Leary, VP Threat Research Center at White Hat Security
Josh Corman, Director, Cyber Statecraft Initiative at Atlantic Council
Rich Mason, President & Chief Security Officer, Critical Infrastructure
Billy Rios, Founder of WhiteScope LLC
Getting app development, DevOps and security teams all on the same page when it comes to implementing AppSec testing in development workflows is often a difficult task. Developers need to do frequent code releases to meet continuous integration (CI) process requirements. Adding security testing into this process is often met with resistance and poor adoption, unless it’s done correctly with the right security training, developer and CI tools integrations, and corporate security buy in by all involved.
Join us as 451’s Scott Crawford and WhiteHat Security’s Anna Chiang discuss what’s needed to truly integrate security into a DevOps environment.
If your organization deals with credit card information, you must take steps to protect the information. Organizations that suffer a breach and have not taken steps to ensure compliance can be penalized, and in some cases may even be prohibited from working with specific payment brands. PCI DSS regulations offer best practices and methodologies for compliance. This webinar lays it all out for you and makes it easy to understand what you need to do.
Build an Active Application Defense System
Web applications accounted for an astounding 40% of last year’s security breaches. The challenges of securing legacy systems, third-party apps, and the extensive shadow IT landscape can be challenging, to put it mildly.
But here’s the good news: The combined F5 and WhiteHat Security approach to web application security represents a powerful new way for organizations to defend against application-level attacks.
Companies are constantly developing new applications, and it’s expensive to stop and patch as soon as a new vulnerability is found. Additionally, it may not be practical to remediate every finding due to issues with legacy code, third-party integrations, or other inherited limitations.
But the integration of F5 Networks and WhiteHat Security technology helps you more quickly identify and remediate vulnerabilities in your web applications. By automating updates to the web application firewall, you can ease the burden of management and reduce costs, while ensuring that your security posture remains strong.
Scott Crawford, 451 Research; Demetrios (Laz) Lazarikos vArmour; Mike Goldgof, WhiteHat Security
Think you understand software security? Think again. If you thought the growth of mobile was explosive, wait until you wade into the brave new world of IoT endpoints, where the security of the software running everything from industries, utilities and transportation to your own home will be the front line of defense.
Join us as 451’s Scott Crawford, vArmour's CISO Demetrios (Laz) Lazarikos, and WhiteHat Security’s Mike Goldgof discuss the new dynamics shaping software security, and the advantages of integrating security throughout the Software Development Life Cycle (SDLC). You’ll learn:
· How software security takes on today’s threat landscape
· What the evolution of DevOps and Continuous Integration mean for security
· Software security’s pivotal role in securing the emerging universe of IoT
· The benefits of security throughout the SDLC (in both dollars and productivity) from secure source to operations, and what to look for in shaping an enterprise strategy
Bill Fearnley, Research Director, IDC Research Inc., Mike Goldgof, Vice President, Product Marketing, WhiteHat Security
In this session, we discuss cybercrime trends in financial services, and how a continuous application security assessment program can help financial service organizations improve their security posture and mitigate risk.
Lynne Dunbrack, IDC Health Insights; Michael Goldgof, WhiteHat Security
Healthcare organizations are increasingly vulnerable to devastating cybercrime attacks on a daily basis. Web applications in healthcare are particularly exposed to such attacks. This webcast will explore how continuous application security assessment-as-a-service which combines machine and human intelligence can help healthcare organizations improve their security and risk posture.
Please join us as IDC’s Lynne Dunbrack and WhiteHat Security’s Mike Goldgof discuss the role of application security in healthcare. You will learn:
- Today’s cyberthreat landscape in the healthcare industry
- Relevant security regulations for healthcare: HIPAA, Breach Notification IFR, HITECH Act, and more
- Vulnerability statistics for healthcare organizations
- How continuous application security testing can help your security and risk posture
Ryan O'Leary, VP Threat Research Center & Technical Support, and Tamir Hardof, CMO, WhiteHat Security
In this insightful and data-rich one-hour webinar Ryan O'Leary, Vice President of WhiteHat Security's Threat Research Center and Technical Support, and Tamir Hardof, Chief Marketing Officer, will present findings from our 2016 Web Applications Security Statistics Report.
The Report, compiled using data collected from tens of thousands of websites, reveals that on average the majority of web applications exhibit two or more serious vulnerabilities per application for every industry at any given point in time. We will provide unique perspectives on the state of website security. Data by industry will be presented and accompanied by expert analysis and recommendations.
- Learn which industries declined, improved, or greatly improved their remediation rates
- Learn how many vulnerabilities are typically remediated and the average time to resolve
- Learn why knowing your risk rating can help you prioritize which vulns to fix first
- Discover the 3 most common web application vulnerabilities
The Top 10 Web Hacks Webinar, now in its tenth year, represents exhaustive research conducted by a panel of experienced security industry professionals. Johnathan Kuskos, TRC Manager for WhiteHat Security will discuss the latest and most insidious web-based attacks of the year.
In this webinar, you will learn:
- The top web hacks, ranked by your peers and a panel of industry experts
- How to protect your organization against these attacks
- Industry wide research on new advanced attack techniques
WhiteHat Security has been in the business of securing applications for over 15 years. In that time, we’ve seen applications evolve and become the driving force of the digital business, but they’ve also remained the primary target of malicious hacks. The WhiteHat Application Security Platform is a cloud service that allows organizations to bridge the gap between security and development to deliver secure applications at the speed of business. This innovative platform is one of the reasons why WhiteHat has won numerous awards and been positioned by Gartner as a Leader in application security testing four times in row. The company is headquartered in Santa Clara, Calif., with regional offices across the U.S. and Europe. For more information on WhiteHat Security, please visit www.whitehatsec.com, and follow us on Twitter, LinkedIn and Facebook.