Surfacing the Invisible Web Application Attacks and Attack Surface Management
Watch for an insightful webinar as Will merges the worlds of web application penetration testing and Attack Surface Management (ASM) data. Using examples from real life penetration tests, he will demonstrate some of the ways web app vulnerabilities can be exploited using information from ASM data, often from overlooked or underestimated sources. Will will also discuss some of the methodologies the service delivery team uses to leverage ASM data on web application assessments to drive impact.
About the Presenter, Will Vandevanter
With 14 years of experience in the realm of penetration testing, Willis Vandevanter has honed a particular focus in web application security marked by a series of open source tools, conference talks, and published advisories. Although new to the field of Continuous Penetration Testing, Will is passionately exploring how to leverage scalability with innovative methodologies and strategic approaches. A lover of the outdoors, Will finds joy in running, surfing, and fitness. Just as in professional life, Will approaches these hobbies with enthusiasm and a perpetual learner’s mindset, embodying the belief of always being a student, never a master.
With 14 years of experience in the realm of penetration testing, Willis Vandevanter has honed a particular focus in web application security marked by a series of open source tools, conference talks, and published advisories. Although new to the field of Continuous Penetration Testing, Will is passionately exploring how to leverage scalability with innovative methodologies and strategic approaches. A lover of the outdoors, Will finds joy in running, surfing, and fitness. Just as in professional life, Will approaches these hobbies with enthusiasm and a perpetual learner’s mindset, embodying the belief of always being a student, never a master.
Continuous Human & Automated Security
The Expert-Driven Offensive Security Platform
Continuously monitor your attack surface with advanced change detection. Upon change, testers and systems perform security testing. You are alerted and assisted in remediation efforts all contained in a single security application, the Sprocket Platform.