Share

Live Webinar – February 20th, 2020 1:00 pm – 2:00 pm EST
Activity Type: Education – Course or Training  1 Hour  1 PDU
Provider: SD Times (Software Development Times)

You’ve been hacked. A developer leveraged a 3rd party library with unsanitized input that a SCA tool can’t flag.

This containerized application goes into production – making your entire cloud infrastructure vulnerable to severe security incidents.

Does this sound familiar?

Tim Buntel (LinkedIn profile) VP of Application Security Products, Threat Stack & Miguel De Los Santos (LinkedIn profile) Senior Security Sales Engineer Threat Stack; will demonstrate and deconstruct a full-stack attack in a containerized application – from the app layer, EC2 layer, to the cloud management console.

Then, Tim & Miguel will discuss how you can proactively identify the risk and remediation guidance for developers.

Tune in to watch this step-by-step attack unfold and how to reduce your own attack surface.

Click to register for:
Attack Simulation:
Deconstructing An Attack In A Containerized Application

0 0 1.0
Technical Project Management Leadership Strategic & Business Management

NOTE: For PMI® Audit Purposes – Print Out This Post!  Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.