Register Now

     First Name:
     Last Name:
     Dept/BOX/ MS:
     Zip/Postal Code:
     Phone: - -
     Fax: - -
     Company URL:

How many employees are in your entire organization?
Register Now
HP Privacy Policy

Bookmark and Share

A Dark Reading Webcast:

How Attackers Identify and Exploit Software and Network Vulnerabilities

Duration: 60 minutes

Every attack on an enterprise begins with a single vulnerability - usually a hole in an application, an open port on a network, or a misconfigured device. But how do the bad guys find these vulnerabilities? What methods do they use to seek out potential entry points, and how do they use those flaws to crack your enterprise data? In this fascinating webcast, top security experts look at the latest trends and techniques in vulnerability detection and offer a detailed look at the latest methods for exploiting vulnerabilities in enterprise applications.

BONUS: All Registrants Get: '10 Top Password Managers Revealed' Slideshow
10 Top Password Managers Revealed

Featured Speakers:

Tim Wilson
Tim WIlson,
Dark Reading

Tom Parker
Tom Parker,
Chief Technology Officer,


UBM Tech - 600 Community Drive, Manhasset, New York 11030 - Privacy Statement