CSE London Conference 2022

Subpage Hero



What Does Application Security Look Like in a Post Log4j World?

03 Mar 2022
Cloud & Cyber Security Keynote
Zero Trust
What Does Application Security Look Like in a Post Log4j World?

The Log4shell vulnerability found in the Log4j logging framework has been recognized as one of the most critical vulnerabilities ever, open source or otherwise. And, while the dangers of the Log4j vulnerability remain high, even X months out, the situation has highlighted an even bigger issue that is plaguing security professionals and developers: if you don’t know what’s in your software supply chain, you’re already behind.

When a flaw is disclosed, companies are instantly thrust into a race against time to fix it before it can be exploited by an attacker, meaning every minute counts. If you don’t know what’s in your software, you’re effectively giving hackers a huge head start.

While this outlook might seem bleak, there are easy steps you can take to significantly mitigate risk. This session will help you do that by answering:

  • Why the Log4j vulnerability is so severe and common remediation measures companies took to secure their code
  • How you can improve your security posture with automation and SBOMs, and better prepared for the inevitable next open source vulnerability that comes along
Paul Horton, Lead Solution Architect - Sonatype

2022 Sponsors

Tech Show London Headline Sponsor

  • IBM


Tech Main Stage Sponsor

  • Oracle


Diamond Sponsor

  • Threatlocker


Stream Sponsors

  • eSentire
  • Appgate
  • Checkpoint


Theatre Sponsor

  • Netskope
  • Sysdig


Platinum Sponsors

  • Aqua
  • Darktrace
  • Sentinel One
  • Snyk
  • Trend Micro
  • Forcepoint


Gold Sponsor

  • Crowdstrike
  • Orca Security


Silver Sponsor

  • Sectigo


2022 Partners

Media Partner

  • Linux Magazine
  • ADMIN Magazine
  • CyberSecurityJobSite.com
  • Elite Business
  • Top Business Tech
  • Cloud Industry Forum
  • ISACA London Chapter


Media Partner

  • Computing Security
  • CIOCoverage
  • TechUK
  • Packt


Media Partner

  • Crest
  • Paybis
  • CEX.io
  • Cyber Defense Magazine
  • CIOInsights
  • Computer Weekly


Security Education Partner

  • ISC2


Media Partner

  • Electronic Specifier
  • Startups Magazine
  • Enterprise Security Magazine
  • Trusted Computing Group
  • EM360


  • Soc.Os
  • Probely
  • Forcepoint

Subscribe to our newsletter!