Penetration Testing: Staying a Step Ahead of the Hackers

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In today’s online world, where new technologies bring benefits, but also give rise to new threats, businesses need to stay a step ahead of the criminals.

One vital tool is frequent penetration testing. In the past, businesses had point-in-time testing performed – testing that occurred once or twice a year – but nowadays that strategy is no longer the most effective in preventing data breaches.

But what are the ethics, legalities, and practicalities of pen testing, and how should it fit organisations' IT security models?

This webinar aims to answer those questions and will cover:

  • The evolution of penetration testing from 'test and forget' to a structured assessment of vulnerabilities;
  • The professionalization of the penetration testing industry;
  • The changing legal and regulatory landscape

Speakers

Photo of Hans Allnutt

Hans Allnutt

Associate, DAC Beachcroft

Photo of Stephen Pritchard

Stephen Pritchard

Freelance Writer, Infosecurity Magazine

Photo of John Yeo

John Yeo

EMEA Director of SpiderLabs at Trustwave

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Trustwave here: https://www.trustwave.com/home/. Please see Infosecurity Magazine’s privacy policy for more information.