Using 2020's Vulnerability Trends to Spearhead Your 2021 Security Posture

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

2020 saw many organizations impacted by various new and altered security vulnerabilities as networking norms shifted dramatically.

Securing the new work-from-home environment became an overnight priority as businesses made efforts to improve overall security posture with increased testing throughout the SDLC, continuous security testing of assets, and rapid vulnerability remediation.

In this webinar, a panel of experts will discuss the key security trends of last year, outline the most common ongoing vulnerabilities and provide an analysis of what you, as a security professional, can do to close gaps and proactively improve security posture.

By attending this webinar, you’ll walk away knowing key security findings from 2020, including:

  • The most common vulnerabilities by category and asset type
  • How average vulnerability severity has changed YoY and why
  • How to increase attacker resistance and cost of attack
  • How to find vulnerabilities that aren’t found through traditional approaches using a crowdsourced security testing platform


Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Caitlin Johanson

Caitlin Johanson

Director, Application Security Center of Excellence, Coalfire

Photo of Jeremiah  Roe

Jeremiah Roe

Solutions Architect & Red Team Expert, Synack

Photo of Dominic Vogel

Dominic Vogel

Chief Security Strategist, Cyber.SC

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Synack here: Please see Infosecurity Magazine’s privacy policy for more information.