Presenter: Rob Jepson (Penetration Tester, Continuous Security Testing Team)
Supply chain attacks are becoming more prevalent in the software world, and third-party code can often introduce weaknesses that critically undermine the security efforts of the developers building an application. This talk will discuss the security principals of using third-party code in the front and back-end of web applications, including some hands-on demonstrations of some real-world attacks and advice on how to identify these in your web applications, and how to remediate the risk.
On completing this hour-long webinar, you'll leave this talk with a deeper understanding of your threat model, and what level of trust you need to apply to each third-party component when building your applications.
Register to join our experts on 28th January at 11am, we look forward to talking to you.