OWASP Top 10: Security Logging and Monitoring Failures - Ep9

Logo
Presented by

John Wagnon, Solutions Architect, F5

About this talk

Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and forensics. The longer an attacker goes undetected, the more likely the system will be compromised. Protect Your Web Apps from New and Critical Risks The OWASP Top 10 is a broad consensus about the most critical security risks to web applications. The update gives guidance to help secure modern web applications and architectures from exploits, abuse, and misconfiguration, as well as recommendations for mitigating new risks involving software supply chains, CI/CD pipelines, and open-source software. Watch the OWASP Top 10 Lightboard Lesson series for a breakdown of the new OWASP Top 10 and learn: • How OWASP creates its Top 10 list of the most critical security risks to web applications. • Recategorization of risk to align symptoms to root causes. • When each risk can manifest, why it matters, and how to improve your security posture. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. OWASP maintains a variety of projects, including the Top 10 web application security risks standard awareness document for developers and security practitioners. By watching this lightboard session, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (158)
Subscribers (23939)
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats.