Venue
Webinar

What is Qwoted?

Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.

Event Date Fri Feb 18 EST (almost 3 years ago)
Location Webinar
Region All
Details

In the months since the Log4Shell vulnerability rocked the Internet, there have been numerous lessons learned. While there's no doubt that defenders will be dealing with vulnerable applications (while pen testers and threat actors target them) for years to come, we can begin implementing lessons immediately. There's little doubt that sooner or later there will be another vulnerability of this magnitude in a widely used library like log4j. Those who have acted to deploy appropriate solutions will no doubt benefit from their diligence and forward thinking. But simultaneously, they'll also be addressing the multitude of log4j vulnerabilities that were inevitably not disclosed by vendors and missed in vulnerability scanning.

Join us to discuss how solutions such as these can set you up for success:
• Software Composition Analysis (SCA) tools
• Threat intelligence for early warning and situational awareness
• Network segmentation to limit the blast radius of a successful exploitation
• API protection and web application security to identify, understand and block attacks that target exposed endpoints
• Zero Trust Networking to limit exploitation vectors
• Vulnerability management solutions to scan for vulnerable applications
• Network Detection and Response (NDR) to identify exploitation and post-exploitation activity

Speakers

2022 Speaker

Jake Williams
Senior Instructor

Sponsors & Partners

2022 Sponsors

• aqua
• CISCO
• corelight
• CROWDSTRIKE
• cyberGRX
• GREYNOISE
• sysdig
• TRHEATX
• TRACEABLE
• Uptycs
• wallarm
• VULV