How do flaws in applications, frameworks, server configurations, or third-party components create vulnerabilities that make modern web applications such an attractive target for attackers?
In what ways do subtle vulnerabilities, such as unsanitised user input reaching critical functions, arise and evade detection, and how can we better identify them?
How can organisations strengthen their SDLC/DevOps processes through automated vulnerability scanning while also addressing the growing risks of supply chain attacks?
*Please note that you register for a session through the general registration.
Slides from the presentation will be visible on this site if the speaker in question wishes to share them.
Please note that you need to be signed in in order to see them.