Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Conference

Bits of Security, Snyk.io: Stranger Danger: Finding Security Vulnerabilities Before They Find You!

Open source modules on the NPM ecosystem are undoubtedly awesome. However, they also represent an undeniable and massive risk, since you’re introducing someone else’s code into your system, often with little or no scrutiny. The wrong package can introduce critical vulnerabilities into your application, exposing your application and your user's data. This talk will use a sample application, Goof, which uses various vulnerable dependencies, which we will exploit as an attacker would. For each issue, we'll explain why it happened, show its impact, and—most importantly—learn how to avoid or fix it.

Building your modern SIEM, Unique security requirements for cloud and modern technologies

Digital transformation has changed the attack surface, and organizations are generating more data than ever before. What does this mean from a security standpoint? Attend this session and hear more about what makes a modern SaaS SIEM solution and why it’s critical for detecting threats across your hybrid and multi-cloud infrastructures. Finally, we’ll explore what tomorrow’s SIEM might look like.

UpGuard Summit opening keynote: Security in 2020

UpGuard co-founder and co-CEO, Alan Sharp-Paul shares UpGuard’s journey in the complex year of 2020 and what the shift to remote work means from a security standpoint. UpGuard helps businesses manage cybersecurity risk. UpGuard's integrated risk platform combines third party security ratings, security assessment questionnaires, and threat intelligence capabilities to give businesses a full and comprehensive view of their risk surface.

The Future of Cyber Security Manchester: What Are Bot Attacks?

Netacea's General Manager, Nick Baglin, talking about a new approach to bots and account takeover at The Future of Cyber Security Manchester 2019. This presentation will reveal the true extent of the bot problem and what you can do to solve it using behavioural machine learning that identifies even the most sophisticated bots.

When robots strike: The hidden dangers of business logic attacks

When organisations consider how to protect their web applications from attacks, they often focus on security scans and pen tests to identify technical security flaws. While this is absolutely correct, there is another risk that often remains undetected until it is too late: business logic attacks.