Co-founders Discuss Key Takeaways from the 2021 OWASP Top Ten

Presented by

OWASP CO-FOUNDERS: Jeff Williams and Dave Wichers

About this talk

The average enterprise uses 765 web applications to run their business, and many of these have serious vulnerabilities. Organizations around the world evaluate their application risk using the OWASP Top Ten. On September 24, the OWASP Foundation released the OWASP Top 10 2021. It’s been four years since the last release, and there are some notable additions, changes, and combinations. Organizations are recalibrating how they measure application risk and reevaluate strategies based on these changes. The co-founders of OWASP address the latest changes to the Top Ten and provide their perspectives on each one. Topics covered during the moderated webinar include: ● New entrants, deletions, and combinations to the Top Ten ● Risks—in terms of prevalence and likelihood to exploit—posed by each of the Top Ten ● How to use the OWASP Top Ten to evaluate risk and existing application security programs ● Potential application security gaps not covered by the OWASP Top Ten ● How to assess application security coverage based on the OWASP Top Ten ● Future trajectories for application cyber threats

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (22)
Subscribers (4743)
Contrast Security is the leader in next-generation application security, embedding code vulnerability analysis and attack prevention directly into software through instrumentation. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improving efficiencies and cost, and enabling rapid scale while protecting applications from known and unknown threats.