You can't secure what you don't acknowledge.SM

Friday, October 18, 2013

What you need to know about security vulnerability assessments (that no one is willing to share)

I'd love it if you'd join me over at SearchSecurity.com next week where I'll be talking about the rest of the story regarding security assessments...

You know the tools and you're probably familiar with the methodologies...that's why I'm going to share with you many other important aspects of security assessments that, unless someone tells you, you'll likely only learn the hard way. And that's no fun.

In my webcast What you need to know about security vulnerability assessments (that no one is willing to share), I'll outline what to do, what not to do, and what you can expect to get out of your vulnerability assessments (or pen tests, or audits, or whatever you call them).

These are things that I've learned in over a decade and a half performing security assessments for hundreds of organizations, thousands of websites/applications/mobile apps, and tens of thousands of network hosts. And there's no cost to you.

Areas I'll cover are the essence of my book Hacking For Dummies including:  
  • Glaring flaws you’re overlooking today
  • Mistakes you're making...and cannot afford
  • Approaches that are guaranteed to help you find the most holes
  • Scoping your next round of testing to maximize its value and minimize your effort
Attendees will be included in a drawing for one of several signed copies of the new 2013 (4th) edition of Hacking For Dummies.



You can register here. Hope to see you next week!

No comments:

Post a Comment