OD WC: Taking an Application-Centric Approach to Attack Surface Management

(Originally aired on Ultimate Windows Security)

Watch now
Attackers are looking for innovative ways to take advantage of vulnerabilities in more applications than ever before. This has caused the scope of vulnerability management to grow well-past just critical systems to now include both local and on-premises infrastructure, cloud-based and virtualized assets and services, as well as – most critically – now the application layer.

Currently this effort is fragmented requiring numerous teams and causing most organizations to adopt multiple point solutions. Conversely, attackers aren’t siloed in their approach to exploitation; even basic reconnaissance includes gathering potential points of exploitation across the entire stack. The next evolution in attack surface management and vulnerability programs must also be an integrated approach where risk is managed and accountability organized around an application AND the associated infrastructure.

This webcast discuss:
  • Why Vulnerability Management needs to expand
  • Challenges to expanding to include applications and infrastructure
  • What MITRE has to say about application security
  • Chipping away at the legacy siloed approach, including methods to initiate change
  • Unanticipated benefits of a coordinated program that attacks the full stack from applications to kernel

Watch now

Fill out the form to access the webcast