Presenter: Presenter: Rob Jepson (Penetration Tester, Continuous Security Testing Team)
USA: 09.00 - 10.00 PST
USA: 12:00 - 13:00 EST
Supply chain attacks are becoming more prevalent in the software world, and third-party code can often introduce weaknesses that critically undermine the security efforts of the developers building an application. This talk will discuss the security principals of using third-party code in the front and back-end of web applications, including some hands-on demonstrations of some real-world attacks and advice on how to identify these in your web applications, and how to remediate the risk.
On completing this hour-long webinar, you'll leave this talk with a deeper understanding of your threat model, and what level of trust you need to apply to each third-party component when building your applications.
Register to join our experts on 28th January, we look forward to talking to you.