Security vulnerability assessment secrets with Kevin Beaver

Security vulnerability assessment secrets with Kevin Beaver

Date: Nov 01, 2013

When it comes to corporate security vulnerability assessments, there's no such thing as a cookie-cutter approach. Simply going through the motions by running -- and relying on -- basic vulnerability scans on your most seemingly critical systems won't identify all vulnerability, and almost certainly will miss the most important ones. Businesses spend so much time, money and effort seeking to check off that box to please regulators, business partners or customers, yet security breaches haunt us like never before. The default approach, the one most assessments follow, is broken.

In this webcast, Kevin Beaver, information security expert and author of the highly successful book Hacking For Dummies, now in its fourth edition, will share his real-world experiences with security vulnerability assessments -- what he has learned and mistakes he has made -- so you can understand what it takes to elevate your network and application security vulnerability testing to the levels they need to be.

About the expert:
Kevin Beaver, CISSP, is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic LLC. He has over 20 years of experience in the industry and specializes in performing independent information security and compliance assessments revolving around information risk management. Kevin has authored or co-authored seven books on information security, including the ethical hacking books Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley) and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He's also the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go. Kevin can be reached at www.principlelogic.com.

View the next item in this Essential Guide: vulnerability management or view the full guide: How to hone an effective vulnerability management program

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: