Join us Thursday, Oct. 24, 2013, at 3:00 p.m. ET for a LIVE SearchSecurity webcast:
What you need to know about security vulnerability assessments (that no one is willing to share)
Every vulnerability assessment is unique. Simply going through the motions, taking the common approach of running – and relying on – basic vulnerability scans on your most seemingly critical systems just doesn’t cut it anymore. Businesses spend so much time, money, and effort seeking that checkbox to please regulators, business partners, or customers yet security breaches are haunting us like never before. The default approach, the one most assessments follow, is broken.
In this insightful webcast, information security expert and author of the highly-successful book, "Hacking For Dummies," Kevin Beaver will share his real-world experiences with security vulnerability assessments – what he has learned and mistakes he has made – so you can understand what it takes to elevate your network and application security vulnerability testing to the levels they need to be.
Topics Kevin will discuss include:
- Glaring vulnerabilities you’re overlooking today
- What you’re not going to dig up in vulnerability assessments (and how to properly set everyone’s expectations)
- Differences between in-house vs. external vulnerability assessments
- The assessment approach that’s guaranteed to help you find the most security holes
- Vulnerability testing gotchas to avoid
- Scoping your next assessment to maximize its value and minimize your effort
- Top things that Kevin does differently knowing what he now knows about security testing
You’ll learn how to be a hunter to track down the vulnerabilities that count so you can finally declare that your vulnerability testing is actually minimizing your business risks. Attendees will also be included in a drawing for one of several signed copies of Kevin’s new 2013 edition of "Hacking For Dummies."
About the speaker:
Kevin Beaver, CISSP, is an independent information security consultant, speaker, and expert witness with Atlanta-based Principle Logic, LLC. He has over 20 years experience in the industry and specializes in performing independent information security and compliance assessments revolving around information risk management. Kevin has authored/co-authored seven books on information security including the ethical hacking books Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley) and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He's also the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at www.principlelogic.com.
This was first published in September 2013