PREPARING FOR THE NEXT ZERO-DAY VULNERABILITY

Presented by

Larry Maccherone, DevSecOps Transformation at Contrast Security and Farshad Abasi, Chief Security Officer at Forward Security

About this talk

Now that dust is settling from Log4Shell, how can you prepare for and prevent the next zero-day vulnerability from impacting your organization? Join this webinar to hear from Larry Maccherone, DevSecOps Transformation lead at Contrast Security, and Farshad Abasi, Chief Security Officer at Forward Security and hear an interactive discussion about how to future-proof against emerging threats on the horizon so your organization is prepared to respond instantly to zero-day vulnerabilities like Log4Shell. Topics for discussion include: What lessons should we draw from our experiences since Log4Shell? Have you seen changes in behavior as a result of Log4Shell? Have other vulnerabilities been discovered due to increased scrutiny of open source libraries? How would you respond to the FTC alert regarding Log4Shell How has this changed your thinking on use of open source libraries, and budget allocation to secure them? What could have been done to protect against the perils of Log4Shell, and how can you prevent the next threat?

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (25)
Subscribers (5089)
Contrast Security is the leader in next-generation application security, embedding code vulnerability analysis and attack prevention directly into software through instrumentation. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improving efficiencies and cost, and enabling rapid scale while protecting applications from known and unknown threats.