Attack Simulation: Deconstructing An Attack
In A Containerized Application
Posted by
EdmontonPM
Feb 12
Live Webinar – February 20th, 2020 1:00 pm – 2:00 pm EST
Activity Type: Education – Course or Training 1 Hour 1 PDU
Provider: SD Times (Software Development Times)
You’ve been hacked. A developer leveraged a 3rd party library with unsanitized input that a SCA tool can’t flag.
This containerized application goes into production – making your entire cloud infrastructure vulnerable to severe security incidents.
Does this sound familiar?
Tim Buntel (LinkedIn profile) VP of Application Security Products, Threat Stack & Miguel De Los Santos (LinkedIn profile) Senior Security Sales Engineer Threat Stack; will demonstrate and deconstruct a full-stack attack in a containerized application – from the app layer, EC2 layer, to the cloud management console.
Then, Tim & Miguel will discuss how you can proactively identify the risk and remediation guidance for developers.
Tune in to watch this step-by-step attack unfold and how to reduce your own attack surface.
Click to register for:
Attack Simulation:
Deconstructing An Attack In A Containerized Application
0 | 0 | 1.0 |
Technical Project Management | Leadership | Strategic & Business Management |
NOTE: For PMI® Audit Purposes – Print Out This Post! Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.
Leave a Reply