The vulnerability game: Mastering the art of vulnerability management

Wednesday
 
27
 
November
3:50 pm
 - 
4:30 pm

Speakers

Balaji Kapsikar

Balaji Kapsikar

Head Of Technology & Cyber Risk
Funding societies

Synopsis

A weakness or flaw in an IT system or application that an attacker can exploit. Sounds like something we should be concerned about, Sounds like something that needs to be managed, doesn’t it? In this presentation the key focus will be on how you can managing vulnerabilities in application specially ?

In today's digital era, application security is of utmost importance. With an increasing landscape of cyber threats and vulnerabilities, organizations face significant risks. In this presentation you will have overview and statistics on Application security breaches with detrimental impact, including financial losses, regulatory penalties, legal liabilities, and damage to reputation. I will also be covering Why, effective application vulnerability management is crucial for organizations to proactively identify, assess, and mitigate vulnerabilities in their applications. By prioritizing and investing in robust application security measures, organizations can protect their critical assets, ensure system integrity, and maintain stakeholder trust.

Understanding application security involves grasping the fundamental principles and concepts that underpin a secure software environment. In This paper presentation I will be presenting includes knowledge of various types of application security vulnerabilities, such as SQL injection, cross-site scripting, and insecure direct object references. It also entails understanding the different attack vectors and exploitation techniques that threat actors employ to target and compromise applications, such as buffer overflows, code injection, and session hijacking. A comprehensive understanding of these aspects enables organizations to build robust defences and implement effective security measures to protect their applications from potential breaches.

I will be covering how to effectively adopt a multi-layered approach by establishing a comprehensive vulnerability management program, risk assessments, use of automated scanning tools and periodic penetration testing.

What You’ll Learn

  • What a vulnerability management program is, the teams involved and accountability.
  • Why, effective application vulnerability management is crucial for organizations to proactively identify, assess, and mitigate vulnerabilities in their applications.
  • What will be the benefits of modern vulnerability management techniques and the disadvantages of the traditional process.
  • How its an important feature of any cyber security strategy and helps to drive some of the first lines of defence.
  • Vulnerability management framework you can use to build your in-house program.
  • Common pitfalls you can avoid when building your program and tips to be successful.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country