Looking for vulnerabilities in existing systems and services has become a common practice, however, vulnerability scanning covers only software packages from established sources and only those vulnerabilities that are already known. But what about vulnerabilities you don't know about yet?
What about the software that is developed in-house. This module will give an introduction into the topics of code audits and vulnerability disclosure, covering two main aspects of vulnerability management for software that you are responsible for. The final session will be an introduction into Breach and Attack simulation, a relatively new approach to judge the risks and consequences of existing vulnerabilities in your network.
Participants will learn:
The module includes 3 sessions - please note that there is one registration - once registered you are welcome to attend all or selected sessions of this module.
Also please note that we shall send you an invitation with the Zoom link closer to the date of the session.
If you have registered less than an hour before the start of a session please email email@example.com to let us know and we shall forward you joining instructions.
Each session will be recorded; we shall notify all the participants how to access recorded sessions once recordings become available.
We look forward to seeing you (virtually) soon.