CSE London Conference 2022

Subpage Hero

  

Loading

What Does Application Security Look Like in a Post Log4j World?

03 Mar 2022
Cloud & Cyber Security Keynote
Zero Trust
What Does Application Security Look Like in a Post Log4j World?

The Log4shell vulnerability found in the Log4j logging framework has been recognized as one of the most critical vulnerabilities ever, open source or otherwise. And, while the dangers of the Log4j vulnerability remain high, even X months out, the situation has highlighted an even bigger issue that is plaguing security professionals and developers: if you don’t know what’s in your software supply chain, you’re already behind.

When a flaw is disclosed, companies are instantly thrust into a race against time to fix it before it can be exploited by an attacker, meaning every minute counts. If you don’t know what’s in your software, you’re effectively giving hackers a huge head start.

While this outlook might seem bleak, there are easy steps you can take to significantly mitigate risk. This session will help you do that by answering:

  • Why the Log4j vulnerability is so severe and common remediation measures companies took to secure their code
  • How you can improve your security posture with automation and SBOMs, and better prepared for the inevitable next open source vulnerability that comes along
Speakers
Paul Horton, Lead Solution Architect - Sonatype

2022 Sponsors

Tech Show London Headline Sponsor

  • IBM

 

Tech Main Stage Sponsor

  • Oracle

 

Diamond Sponsor

  • Threatlocker

 

Stream Sponsors

  • eSentire
  • Appgate
  • Checkpoint

 

Theatre Sponsor

  • Netskope
  • Sysdig

 

Platinum Sponsors

  • Aqua
  • Darktrace
  • Sentinel One
  • Snyk
  • Trend Micro
  • Forcepoint

 

Gold Sponsor

  • Crowdstrike
  • Orca Security

 

Silver Sponsor

  • Sectigo

 

2022 Partners

Media Partner

  • Linux Magazine
  • ADMIN Magazine
  • CyberSecurityJobSite.com
  • Elite Business
  • Top Business Tech
  • Cloud Industry Forum
  • ISACA London Chapter

 

Media Partner

  • Computing Security
  • CIOCoverage
  • TechUK
  • Packt

 

Media Partner

  • Crest
  • Paybis
  • CEX.io
  • Cyber Defense Magazine
  • CIOInsights
  • Computer Weekly

 

Security Education Partner

  • ISC2

 

Media Partner

  • Electronic Specifier
  • Startups Magazine
  • Enterprise Security Magazine
  • Trusted Computing Group
  • EM360

 

  • Soc.Os
  • Probely
  • Forcepoint

Subscribe to our newsletter!