Skip to content

Details

While teams are overwhelmed by vulnerability assessments, they rarely understand how popular vulnerability scanners arrive at these determinations. Using popular container scanning tools for illustration, we will break down how your tooling goes from beginning a scan to delivering findings. From that foundation, we'll work through how to read bulletins for a particular CVE and understand what the technical language means. Finally, we'll work through how teams can ensure that the results are accurate and applicable.

This webinar will help you:

  • Understand how vulnerability scanners work
  • Read CVE bulletins like a pro
  • Evaluate vulnerability scans to address concerns

Speaker: Neil Carpenter
Field CTO, Minimus
Neil helps organizations identify and contain security risks in their cloud estates. His passion for getting ahead of security problems comes from over a decade of leading customer-facing security incident response teams at Microsoft and seeing what happens when attackers win. Neil also helped build the future of cloud-native security at Twistlock, StackRox, Torq, and Orca Security before joining Minimus. When he's not in front of a computer, Neil is an avid NYC-based street photographer.

You may also like