Sponsored by ShiftLeft
April 17, 2019
2 PM EST
Technical security vulnerabilities, such as SQL injections, cross-site scripting, etc. come from coding errors. However, business logic vulnerabilities are due to mistakes in how the application was intended to work. Since the code was written properly, business logic vulnerabilities cannot be detected using traditional source code analysis techniques. Historically, the only way to find business logic vulnerabilities in development was via manual source code reviews, which does not scale to the pace of modern DevOps driven release cycles.
This webinar will demonstrate how to write custom queries of your source code to look for common business logic vulnerabilities such as:
- DoS attacks
- Authentication enforcement
- Data privacy compliance
- Encryption compliance
The webinar will also demonstrate how the custom queries can be automatically inserted into your DevOps pipeline via pull request, build or release.
Chetan Conikee, CTO &
Co-founder, ShiftLeft
* REGISTER AND ATTEND THIS ENTIRE WEBINAR AND 3 PEOPLE HAVE THE CHANCE TO WIN A $50 AMAZON GIFT CARD RIGHT ON THE SPOT!
This Campaign is open only to those who register for and attend the entire webinar. Employees of MediaOps and webinar sponsor(s)], its affiliates, subsidiaries, advertising and promotion agencies, and suppliers, (collectively the “Employees”), and immediate family members and/or those living in the same household of Employees are not eligible to participate in the Campaign. The Campaign is subject to all applicable laws and regulations. Void where prohibited. The Winner(s) of the Campaign will receive a $50 Amazon gift card which will be provided by MediaOps. Winners will be selected by the webinar moderator at the conclusion of the event and announced live at that time. You must be an attendee at the time of the drawing to win. No purchase is necessary. It is agreed that MediaOps has permission to use your name as a winner in promotional efforts and social media.