Every organization hosts vulnerable web applications. Unfortunately, external attackers are often the first to reveal their exposures. There is hope, though: We can harden systems to stop application flaws from opening the door to all-out data breaches.

In his previous Attack and Defense webinar, Jay Beale introduced us to Linux containers. During this installment, Jay will demonstrate how to use two chained vulnerabilities to break into a vulnerable virtual machine. He’ll then turn the tables, and show us how to proactively disrupt the attack chain and prevent the breach. In this webinar, you’ll learn how to:

  • Find and exploit web application vulnerabilities
  • Prevent applications from being exploited
  • Break attack chains that lead to data breaches
Profile photo of Jay Beale

Jay Beale

co-founder, COO and CTO, InGuardians

Jay Beale has created several defensive security tools, including Bastille Linux/UNIX and the CIS Linux Scoring Tool, both of which were used widely throughout industry and government. He has served as an invited speaker at many industry and government conferences, a columnist for Information Security Magazine, SecurityPortal and SecurityFocus, and a contributor to nine books, including those in his Open Source Security Series and the “Stealing the Network” series. He has led training classes on Linux Hardening and other topics at Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training. Jay is a co-founder, Chief Operating Officer and CTO of the information security consulting company InGuardians.