// meta tag RiskSense Webinar to Expose 10 Year Weaponization Pattern of Apache Struts Vulnerabilities | Hackers Enigma

RiskSense Webinar to Expose 10 Year Weaponization Pattern of Apache Struts Vulnerabilities

 RiskSense®, Inc., the pioneer and market leader in cyber risk management, today announced that it will present a webinar on Dec. 14 that uses research findings on Apache Struts vulnerabilities over a 10 year period to illustrate the shortcomings in traditional approaches to vulnerability detection and assessment. The presenters will also outline best practices for identifying and remediating the most hhigh-riskthreats to prevent attacks.

WHO: 

Anand Paturi, Vice President of Research and Development

Barry Cogan, Senior Security Analyst

WHAT

The recent Apache Struts vulnerability was responsible for several high profile data breaches. In this webinar, two leading RiskSense researchers will present findings based on the analysis of Apache Struts-related vulnerability weaponization patterns over the past decade, including the fact that scanners are still unable to detect nearly 15 documented Common Vulnerabilities and Exposures (CVEs).

The webinar will include a live demonstration of Apache Struts exploits, and present best practices for using intelligence about attack patterns to identify and prioritize the highest risk threats so they can be remediated first to prevent attacks and security breaches.

WHEN:  

Thursday, Dec. 14, 2017 at 2:30 PM EST

WHERE:   

Webinar, delivered to your digital device.

HOW: 

To schedule a conversation with RiskSense, contact Marc Gendron at marc@mgpr.net or +1 781.237.0341.  For more information, visit: https://www.brighttalk.com/webcast/15653/292863?utm_source=RiskSense&utm_medium=brighttalk&utm_campaign=292863

Resources

RiskSense Platform Overview: http://bit.ly/2yIJ1YE
White Paper on Operationalizing Cyber Risk: http://bit.ly/2gaurSX
Webinar on Cyber Risk Management: What’s Holding Us Back? http://bit.ly/2xTE2ba

0 Comments

No comments!

There are no comments yet, but you can be first to comment this article.

Leave reply

<

*