Skip to content

[vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” background_image=”348335″ box_shadow_on_row=”no”][vc_column css=”.vc_custom_1509976289581{padding-top: 200px !important;padding-bottom: 199px !important;}”][vc_column_text]

PAST WEBINARS

[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text css=”.vc_custom_1610327259479{padding-top: 25px !important;padding-bottom: 25px !important;}”]Prioritizing Vulnerability Remediation Using Risk Scoring – Boardroom

 

February 11, 2021

 

3:00pm-4:00pm CST; 4:00pm-5pm EST

 

1 CPE / 0.1 CEU / CISSP / 1 PDU Credits Awarded

 

Conference location: Online


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_column_text]


Application security debt can quickly overwhelm security and development teams. This translates into greater risk. For example, research reveals that the average application has 20 vulnerabilities in development and 4 in production. To address this growing challenge, Contrast Security recently released the Contrast RiskScore™ that assigns a numerical score using an algorithm consisting of four elements. The reality is that certain vulnerabilities pose greater risk than others, and moreover vulnerability risk changes over time. This presentation will explain how developers and security practitioners can use the RiskScore to pinpoint the risk of vulnerability types and prioritize vulnerability management based on that risk. In doing so, they can reduce their security debt and mean time to remediate (MTTR) vulnerabilities while managing down their risk.

 

Webinar Price: $0.00 per person


David Lindner

Chief Information Security Officer, Contrast Security

 

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.


Each attendee will receive a certificate awarding 1 CPE credit for CISSP continuing education, in addition to 0.1 CEUs and 1 PDU. CISSP is a registered certification mark of (ISC)², Inc.


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row]