Hi [[ session.user.profile.firstName ]]

CMD+CTRL Peek & Play

Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
Recorded Feb 14 2018 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roman Garber, Development & Security Manager, Security Innovation
Presentation preview: CMD+CTRL Peek & Play

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • CMD+CTRL Peek & Play Feb 28 2018 6:00 pm UTC 30 mins
    Roman Garber
    Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • CMD+CTRL Peek & Play Recorded: Feb 14 2018 29 mins
    Roman Garber, Development & Security Manager, Security Innovation
    Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • The OWASP Top 10 2017 - Let's Cut to The Chase Recorded: Feb 7 2018 60 mins
    Kevin Poniatowski and Mark Burnett
    What Do You REALLY Need to Know About the New OWASP Top Ten?

    The OWASP Top Ten is the de-facto web application security standard because it reflects the evolving threat landscape, providing organizations a framework to manage and mitigate application security risk.

    This dual-presenter format will examine the critical newcomers and pesky incumbents from both an offensive and defensive perspective. Attend to get our expert insight on how to harden Web applications and align your program towards OWASP compliance.


    Topics covered include:

    - The newcomers – why they are so tricky and elude traditional test efforts
    - XSS and Injection – mistakes organizations keep making that land these preventable threats on every Top Ten list
    - Design flaws that cause them and coding errors that expose them
    - High impact activities that reduce exploitability, prevalence and impact

    Meet the Presenters:

    Kevin Poniatowski, Sr. Security Instructor & Engineer at Security Innovation, brings an optimal blend of speaking ability, technical savvy, and an insatiable passion for security to Security Innovation's training customers. Kevin entered the application security field in 2007 with Security Innovation, where he has split time between application security course development and delivering instructor-led courses.

    Mark Burnett is a security consultant, author, and researcher who specializes in application security, authentication, and hardening Microsoft Windows-based servers and networks. Since 1999 he has worked in numerous areas of IT security, developing unique strategies and techniques for protecting critical assets. Mark is author and coauthor of a number of security books and publishes security articles for several web sites, newsletters, and magazines.
  • Reducing Application Risk: What Technology Can & Can’t Protect Against Recorded: Jan 12 2018 49 mins
    Mike Cooper, Sr. Security Manager, Security Innovation
    Applications are the primary target of attack due to their prevalence and inherent exposure, and require a solid defense in depth strategy to reduce risk. This on-demand webinar aims to educate IT and development teams on technologies available to build and deploy more secure software systems and debunks common myths about what each can and cannot protect.

    Topics include:

    - Network vs. Application Security
    - Secure Communication Technologies: Virtual Private Networks (VPNs), -
    Firewalls and Intrusion Detection Systems (IDS)
    - Hardening and Lockdown Tools: integrity checkers, anti-virus, access control, vulnerability assessment, and run-time application self-protection (RASP)
    - Shields Up: building stronger defenses
  • How To Test For The OWASP Top Ten Recorded: Dec 14 2017 63 mins
    Jason Taylor, CTO, Security Innovation
    The OWASP Top 10 is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack.

    Watch this on-demand webinar as Jason Taylor, one of our most experienced security experts, takes us through the journey of identifying the tell-tale markers of the OWASP Top Ten and reveals the techniques used to hunt them down.

    This session covers:

    Vulnerability anatomy – how they present themselves
    Analysis of vulnerability root cause and protection schemas
    Test procedures to validate susceptibility (or not) for each threat
  • OWASP Top Ten - Threats & Mitigations Recorded: Dec 1 2017 59 mins
    Jason Taylor, CTO, Security Innovation
    The OWASP Top Ten is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack.

    This on demand webinar presents the OWASP Top Ten in an abridged format, interpreting the threats for you and providing actionable offensive and defensive best practices. It is ideal for all IT/development stakeholders that want to take a risk-based approach to Web application security.
Securing software in the connected world
In today's connected world, software runs everything - from smart phones to banking applications, cars to home security systems, even refrigerators, garage doors and other every day devices are "connected." Software is everywhere – and unfortunately, it provides the largest attack surface for hackers. We are a cybersecurity company leveraging our deep knowledge of software security to create relevant products and services.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CMD+CTRL Peek & Play
  • Live at: Feb 14 2018 6:00 pm
  • Presented by: Roman Garber, Development & Security Manager, Security Innovation
  • From:
Your email has been sent.
or close