News Events

Webinar: Web Application Attacks & Attack Surface Management

Watch this webinar hosted by Will Vandevanter

Webinar: Surfacing The Invisible: Web Application Attacks And Attack Surface Management

Watch here

** Once on the webpage, click "watch" to sign up. You will need to make a Revnt account to sign up.

Thursday, January 11, 1 pm CST.

Join us for an insightful webinar as Will merges the worlds of web application penetration testing and Attack Surface Management (ASM) data. Using examples from real life penetration tests, he will demonstrate some of the ways web app vulnerabilities can be exploited using information from ASM data, often from overlooked or underestimated sources. Will will also discuss some of the methodologies the service delivery team uses to leverage ASM data on web application assessments to drive impact.


About Will Vandevanter

With 14 years of experience in the realm of penetration testing, Willis Vandevanter has honed a particular focus in web application security marked by a series of open source tools, conference talks, and published advisories. Although new to the field of Continuous Penetration Testing, Will is passionately exploring how to leverage scalability with innovative methodologies and strategic approaches. A lover of the outdoors, Will finds joy in running, surfing, and fitness. Just as in professional life, Will approaches these hobbies with enthusiasm and a perpetual learner’s mindset, embodying the belief of always being a student, never a master.




Media Contact

Marketing, Sprocket Security
marketing@sprocketsecurity.com

Continuous Human & Automated Security

The Expert-Driven Offensive
Security Platform

Continuously monitor your attack surface with advanced change detection. Upon change, testers and systems perform security testing. You are alerted and assisted in remediation efforts all contained in a single security application, the Sprocket Platform.

Watch Demo Request Quote

Expert-Driven Offensive Security Platform

  • Attack Surface Management
  • Continuous Penetration Testing
  • Adversary Simulations