How To Remediate Application Security Vulnerabilities

Logo
Presented by

Ted Harrington, Executive Partner at Independent Security Evaluators (ISE)

About this talk

The nature of software is that security vulnerabilities exist, and need to be eradicated. Once you find those vulnerabilities (as Ted taught in his last talk - link in Attachments), next you need to fix them. But developers are already overloaded, deadlines are looming, and there just isn't time to add remediation work. However, if you don't fix the vulnerabilities, you've wasted the money, effort, and time invested in finding them in the first place -- all while leaving a vulnerable system unnecessarily exposed. How is a busy team to handle this conundrum? In this talk, author Ted Harrington extracts insights from his book Hackable in order to teach you how to deal with all of this. You'll learn how to: - Prioritize Vulnerabilities by Severity - Remediate Vulnerabilities - Verify Remediations ...and more!
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (707)
Subscribers (198709)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.