"The Devil Steals Prada: The Cost of Business Logic Flaws"

white hat security

"This presentation will demonstrate the value of manual business logic assessments and provide an example of a vulnerability that scanners cannot find because the problem isn’t in the code or framework.

We will provide a real life instance of a business logic flaw at a major high-end clothing retailer. The flaw allowed malicious users to purchase negative amounts of expensive merchandise, and credit thousands of dollars to their accounts. "
Watch Now

Spotlight

In the industrial cybersecurity industry today, there are two main challenges facing those responsible for protecting their organizations’ networks: a largely unknown threat landscape and a shortage of experienced personnel with effective threat detection and response capabilities. With the number of threats to the ICS industry increasing every year, organizations are assessing their need for industrial cybersecurity in response to these challenges, and many are looking for support from ICS cybersecurity platforms that can make the most of their budgets, supplement their defenses, and give them more resilient security postures.


OTHER ON-DEMAND WEBINARS

"The Internet of Things (IoT): Critical risks for all enterprises"

"A recent report by Forrester Research identified security as being the ""top concern"" for enterprise technology and business decision-makers for IoT*. While the Internet of Things offers great potential for businesses to create new services and improve operational efficiencies, it offers a greater potential for security breaches. Join us for a compelling webcast that will walk you through the latest security insights for combating IoT risks. We will also discuss: - Key trends driving IoT - Vulnerabilities within your organization that you need to be aware of - The latest strategies and techniques cyber-criminals are using today - What your organization can do to address these security risks "

How Security Services Fuel Growth for MSPs

Webroot

Faced with modern cyber threats, your clients’ security requirements are changing by the minute. To ensure the highest levels of service and security, MSPs like you need to understand, meet, and exceed those requirements—and you have to do it better than your competition can. Join this webinar to hear Aaron Sherril, Sr. Analyst with 451 Research, and Hal Lonas, CTO for Webroot, discuss the findings of two 451 Research’s global surveys to learn what MSPs need to do to make their cybersecurity services business more profitable.

Better Protect Your Web Apps by Knowing How They Will Be Attacked

Alert Logic

Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will: gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise, learn about attack methodologies and how vulnerable web apps can be leveraged for attackers to gain privileged access.

Insider Knowledge on the Battle to Stop Advanced Cyber Attacks

Hear first hand from a FireEye customer and their battle against advanced cyber attacks.See how legacy security technologies have been rendered ineffective.Review the five stages of an advanced cyber attack.

Spotlight

In the industrial cybersecurity industry today, there are two main challenges facing those responsible for protecting their organizations’ networks: a largely unknown threat landscape and a shortage of experienced personnel with effective threat detection and response capabilities. With the number of threats to the ICS industry increasing every year, organizations are assessing their need for industrial cybersecurity in response to these challenges, and many are looking for support from ICS cybersecurity platforms that can make the most of their budgets, supplement their defenses, and give them more resilient security postures.

resources