DevSecOps, Detection & Supply Chains: Stopping Hackers Before they Strike
Description
How do flaws in applications, frameworks, server configurations, or third-party components create vulnerabilities that make modern web applications such an attractive target for attackers?
In what ways do subtle vulnerabilities, such as unsanitised user input reaching critical functions, arise and evade detection, and how can we better identify them?
How can organisations strengthen their SDLC/DevOps processes through automated vulnerability scanning while also addressing the growing risks of supply chain attacks?
Slides from the presentation will be visible on this site if the speaker in question wishes to share them.
Please note that you need to be signed in in order to see them.