Finding Apache Log4j Vulnerabilities In Your Attack Surface


This event qualifies for 1 CPEs


Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide range of computer systems. Jen Easterly, Director of CISA, called Log4Shell the most serious vulnerability she's seen in her career. There have already been hundreds of thousands, perhaps millions, of attempts to exploit the vulnerability.

 

CyCognito's Discovery and Autonomous Security Testing is the most comprehensive and accurate assessment available to give you an attacker's perspective on all of your externally facing assets - especially those that are vulnerable to attack. CyCognito finds vulnerable assets and tags them for inspection - particularly products and technologies to the Log4j vulnerability. Join this webinar to understand how you can identify your vulnerable technologies and get recommendations for the next steps you can take to protect your organization.

 

Register today to learn about:

  • Key elements of a Log4j response plan
  • How the CyCognito platform can detect your exploitable Log4j vulnerabilities easily
  • Recommendations for a response plan that you can use for critical vulnerabilities today and in the future

Speaker and Presenter Information

Jim Wachhaus, Attack Surface Management Evangelist, CyCognito

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Tue, Feb 8, 2022, 2:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Where
Free Webinar


Website
Click here to visit event website


Event Sponsors

CyCognito


Organizer
CyCognito Government Team at Carahsoft


Contact Event Organizer



Return to search results