Hi [[ session.user.profile.firstName ]]

Protect Your Web Applications from Component Vulnerabilities

Web applications are becoming increasingly complex, with most applications now built using multiple layered components, such as web servers, web frameworks, language engines and JavaScript libraries. The growing number of cyber attacks stemming from component vulnerabilities highlights a limitation of conventional scanning for securing web applications. Join Tenable experts to learn how you can go beyond traditional scanning to better protect your web application estate from component vulnerabilities.

Sean Storer is the Product Marketing Manager for WebApp and Container security at Tenable. He is a security professional with 10 years experience as a consultant and program manager. Throughout his career he has worked with companies and agencies in every sector from the federal government to SaaS startups to help them understand and modernize their security and risk management processes and technology. In his current role, Sean helps security practitioners adopt Tenable’s most innovative products in order to secure every part of the modern attack surface including traditional IT, cloud, containers, web apps and IoT.
Recorded Sep 23 2019 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sean Storer, Product Marketing Manager, WebApp & Container Security @ Tenable
Presentation preview: Protect Your Web Applications from Component Vulnerabilities

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protect Your Web Applications from Component Vulnerabilities Recorded: Sep 23 2019 39 mins
    Sean Storer, Product Marketing Manager, WebApp & Container Security @ Tenable
    Web applications are becoming increasingly complex, with most applications now built using multiple layered components, such as web servers, web frameworks, language engines and JavaScript libraries. The growing number of cyber attacks stemming from component vulnerabilities highlights a limitation of conventional scanning for securing web applications. Join Tenable experts to learn how you can go beyond traditional scanning to better protect your web application estate from component vulnerabilities.

    Sean Storer is the Product Marketing Manager for WebApp and Container security at Tenable. He is a security professional with 10 years experience as a consultant and program manager. Throughout his career he has worked with companies and agencies in every sector from the federal government to SaaS startups to help them understand and modernize their security and risk management processes and technology. In his current role, Sean helps security practitioners adopt Tenable’s most innovative products in order to secure every part of the modern attack surface including traditional IT, cloud, containers, web apps and IoT.
  • Find and Fix the Vulnerabilities Posing the Greatest Risk to Your Business Recorded: Aug 20 2019 38 mins
    Gavin Millard, Vice President, Product Marketing, Tenable
    According to recent polling, 80% of infosec professionals want an efficient and effective way to prioritize vulnerabilities based on risk. Of those polled, 50% are attempting to risk rate vulnerabilities, but finding the process really hard.

    Tenable is resolving the vulnerability prioritization challenge with a new process we call Predictive Prioritization.

    Join us at 2pm ET, August 20, 2019 to learn more about the data and computer science behind Predictive Prioritization by attending the webinar: " To Reduce Cyber Exposure, Find and Fix the Vulnerabilities that Matter Most."

    Topics covered will include:

    * How to overcome the limitations of CVSS scoring for risk rating vulnerabilities

    * How you can effectively identify the vulnerabilities that will most likely be exploited in the near term

    * Ways to dramatically improve your remediation efforts by focusing on the the highest risk vulns

    * Answers to your questions during live Q&A

    All IT and infosec professionals responsible for ensuring the efficient and effective delivery of vulnerability management programs are encouraged to attend this webinar.

    Save your spot. Register now.
  • [PANEL] Top Threats to Network Security and How to Protect Against Them Recorded: Aug 20 2019 64 mins
    Kalani Enos, kenos Technologies LLC | Greg DeBrecourt, Aerovironment | Gavin Millard, Tenable | Peter Wood, Naturally Cyber
    Securing the networks from attackers remains a key challenge in 2019. With billions of people affected by data breaches, governments and businesses are continuing to spend more time and money trying to better protect against cyber attacks.

    Join this panel of experts as they discuss the biggest threats to enterprise networks and how to better protect against them:
    - Top threats to network security
    - Watering hole attacks: Explanation and examples
    - Microsegmentation and lateral movement prevention
    - How to improve the security of network infrastructure devices
    - Real time breach detection: Myth or reality?
    - Steps to take to better secure your networks

    Speakers:
    - Kalani Enos, Founder and CEO, kenos Technologies LLC (moderator)
    - Greg DeBrecourt, Cyber Security Manager, Aerovironment
    - Gavin Millard, Vice President of Product Marketing, Tenable
    - Peter Wood, Partner, Naturally Cyber LLP
  • Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets Recorded: Oct 24 2017 40 mins
    Corey Bodzin, Vice President of Product Operations, Tenable
    As your organization embraces cloud infrastructure, DevOps technologies, and other modern assets, you have new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security you need to rethink how you do things. For example, containers have become the defacto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover how DevOps and modern assets have turned the six steps of the vulnerability management life cycle on their head. During this webinar we’ll cover:
    - Where vulnerability management for today’s assets needs to start (and it’s not where it used to)
    - Why prioritization should not be based on scan results
    - Why assessments and network scans are no longer synonymous
    - Why reports and PDFs are no longer the answer
    - What the new face of remediation looks like
    - How DevOps can be convinced to incorporate security (without name calling and threatening!)
  • The Politics of Stakeholders within the CISO world Recorded: Jan 31 2013 56 mins
    Craig Shumard, Principal, Shumard and Associates, LLC, Emeritus CISO, Cigna
    CISOs must deal with several stakeholders within the organization. These stakeholders range from BOD members, C-Level management, peer compliance stakeholders (e.g. Legal, Privacy Office), vendors, and the IT organization itself.

    This session will focus on critical success factors to dealing with this wide array of stakeholders and success case studies.

    Specifically, this session will discuss the politics of getting alignment and buy in with the many stakeholders within the organizations such as:
    •Board of Directors and C-Level management
    •Natural allies such as compliance, privacy, audit, enterprise risk management
    •Potential contentious relationships with line or business unit management
    •IT organization strategic and tactical delivery goals and objectives

    Speakers include:
    •Craig Shumard, Principal, Shumard and Associates, LLC, Emeritus CISO, Cigna
    •Tom Doughty, VP & CISO,Prudential
    •Larry Brock, CISO emeritus, Dupont
    •Bob Hillmer, Director, Enterprise Information Security and Directory Services
    •Marcus Ranum, CSO, Tenable Network Security
  • The Politics of Risk Tolerance Recorded: Dec 13 2012 52 mins
    Craig Shumard, Principal, Shumard and Associates, LLC, retired CISO, Cigna
    A Politics of Information Security Webcast.

    This webcast will focus on how risk tolerance is decided within an organization and the processes and politics of risks assumption. Topics to be covered include:

    - How risk tolerance is decided within an organization
    -- Informal to formal risk tolerance model
    - How and who can assume risk
    - Risk assessment and risk assumption linkages
    - Competing Drivers
    -- Business unit versus enterprise risk

    Presenters include:
    - Craig Shumard, Principal, Shumard and Associates, retired CISO, Cigna
    - Dennis Brixius, VP of risk management and CSO, McGraw Hill
    - Catherine Rees, CISO, Dow Jones & Company
    - Marcus J. Ranum, CSO, Tenable Network Security
  • The CISO Job - Getting and Keeping It Part II Recorded: Sep 25 2012 58 mins
    Craig Shumard, Principal, Shumard and Associates, LLC, retired CISO, Cigna
    A Politics of Information Security Webcast
    Earlier this year, a panel of Chief Security Officers from some of the nation’s highest profile companies met to talk about how to get and keep the CISO job. The response was tremendous – over 1,000 people have participated in the session. But that talk only scratched the surface – our team of panelists has much more information to share. Join us for Part II of the discussion where we’ll dig into some of the questions that didn’t get answered in the initial discussion, and cover more ground on topics like working with senior management.
    You'll learn:
    How to Get the CISO Job:
    - How to deal with senior management
    - Establishing governance frameworks to guide your activities
    - Advice on balancing tactical vs. strategic efforts
    - Positioning yourself as an enabler, not a blocker
    - Staying ahead by meeting all important audit and regulatory requirements
    Featured Speakers:
    - Craig Shumard, Principal, Shumard and Associates, LLC, retired CISO, Cigna
    - Marcus Ranum, CSO, Tenable Network Security
    - Todd Bearman, CISO, Towers Watson
    - Vas Rajan, CISO, ING Direct
    - John Masserini, Chief Security Officer of Miami International Holdings and the Miami International Securities Exchange (MIAX)
  • The CISO Job - Getting It, and Keeping It Recorded: May 31 2012 63 mins
    Featuring Craig Shumard, Marcus Ranum, and Todd Bearman
    A Politics of Information Security Webcast

    Over the last decade, the Chief Information Security Officer (CISO) has emerged as the job in IT risk management. But for many, it's a high-risk career move. Average tenures in the role remain mired at just a few years. But success is possible — join our expert panel to learn how you can get, and keep, the CISO job.

    You'll learn:

    How to Get the CISO Job:
    - Who gets to the top of the shortlist
    - Whether certifications play a role
    - How experience in other parts of the organization can help your bid

    And Then, How to Keep It:
    - How to deal with senior management
    - Establishing governance frameworks to guide your activities
    - Advice on balancing tactical vs. strategic efforts
    - Positioning yourself as an enabler, not a blocker
    - Staying ahead by meeting all important audit and regulatory requirements


    Featured Speakers:
    - Craig Shumard, Principal, Shumard and Associates, LLC, retired CISO, Cigna
    - Marcus Ranum, CSO, Tenable Network Security
    - Todd Bearman, CISO, Towers Watson
Industry-expert insights on overcoming critical security challenges
Tenable™, Inc. is the Cyber Exposure company. Over 27,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Join Tenable as we share why Tenable is uniquely positioned to help you defend your modern attack surface that includes cloud, containers and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect Your Web Applications from Component Vulnerabilities
  • Live at: Sep 23 2019 6:00 pm
  • Presented by: Sean Storer, Product Marketing Manager, WebApp & Container Security @ Tenable
  • From:
Your email has been sent.
or close