Evaluating Your Website for Security Vulnerabilities

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Data leaks. Downtime.  Defacement. These three D’s are the most common outcomes resulting from website hacking incidents. Any of these alone can serve as a source of embarrassment for your organization; all three could lead to near-term disaster. And this is just a few of the examples of what can go wrong.

Yet, research shows that the effects of many of these attacks can be blunted, if not prevented altogether. The latest figures from the Verizon Data Breach Investigations report demonstrate that of all data breach incidents – many involving website compromises – 96% were what it described as “not highly difficult”.

Many security analysts also observe that the tools to fight web-based security vulnerabilities – both technological and process-based – are well within the hands of those who are responsible for their maintenance and administration. If you have any role in the security of your organization’s website, then this webinar will contain indispensable information. 

This Webinar Will:

  • Discuss frequently used attack vectors for compromising websites 
  • Show you how to leverage the vast selection of security technologies for a more trusted, secure website and – by extension – customer experience, including malware scanning and SSL/EV SSL
  • Review common web application vulnerabilities, and provide educational and process/procedural suggestions to help reduce your vulnerabilities

Who Should Attend?

  • IT security managers, CISOs, CSOs, CIOs who are responsible for website security
  • Site administrators and developers for e-commerce websites
  • Anyone who is interested in receiving common-sense, valuable advice on improving website security


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Richard Moulds

Richard Moulds VP product management & strategy, Thales e-Securit

    David Robinson

    David Robinson Security Consultant, Context Information Security

      Craig Spiezle

      Craig Spiezle Executive Director, Founder & CEO, Online Trust A

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.