In this session, executives will realize the mismatch between the types of security assessments organizations request versus the evaluations they actually need. With the majority of web-based vulnerabilities being discovered within an application’s complex inner-workings including its access control barriers, data control models, and tiered architecture, having the capability to effectively identify them is critical to an organization’s cyber defense. Understanding why, and how, attackers are successfully bypassing your applications’ defenses will help leadership teams take proper action to improve their security approach to application defense and in turn mitigate this growing cyber risk.
Join this session to learn more about Mandiant’s findings and to gain new insights from event thought leaders and your peers where we’ll dissect the most dangerous cyber threats facing businesses today.
DISCUSSION POINTS
By submitting this form you agree to our Privacy & GDPR Statement.
If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.
*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.
Continue the conversation with your industry peers
Complete a brief 5-minute survey here
Tom Field
SVP, Editorial
ISMG
Christian Elston
Senior Security Consultant
Mandiant
Join Christian Elston, Senior Security Consultant from sponsor Mandiant, and ISMG SVP of Editorial, Tom Field to speak about ‘An in depth look at the evolving cyber threat landscape’
This session will be:
Senior Security Consultant
Mandiant
Elston is a senior red team consultant in Mandiant’s Central Region. As part of the red team, Elston leads the in-region web application specialists. He comprehensively assesses web, mobile, API, and thick client applications for security vulnerabilities and consults with clients directly to manage their information security risk. He routinely led multi-component, complex assessments and mentors junior team members. Previously, Elston also worked for the Central Intelligence Agency. In his role, he managed clandestine intelligence operations leveraging subject matter expertise on wide-ranging country, region, and transnational topics of national security interest. He evaluated foreign intelligence to ensure U.S foreign policy and national security decision-makers were provided with timely, accurate, clear, and concise reporting in a manner while safeguarding sensitive intelligence sources and methods.
9150 International Drive, Orlando, FL 32819
By taking part in this discussion you agree that:
Upcoming ISMG Events