I’d love it if you’d join me over at SearchSecurity.com next week where I’ll be talking about the rest of the story regarding security assessments…
You know the tools and you’re probably familiar with the methodologies…that’s why I’m going to share with you many other important aspects of security assessments that, unless someone tells you, you’ll likely only learn the hard way. And that’s no fun.
In my webcast What you need to know about security vulnerability assessments (that no one is willing to share), I’ll outline what to do, what not to do, and what you can expect to get out of your vulnerability assessments (or pen tests, or audits, or whatever you call them).
These are things that I’ve learned in over a decade and a half performing security assessments for hundreds of organizations, thousands of websites/applications/mobile apps, and tens of thousands of network hosts. And there’s no cost to you.
Areas I’ll cover are the essence of my book Hacking For Dummies including:
Attendees will be included in a drawing for one of several signed copies of the new 2013 (4th) edition of Hacking For Dummies.
You can register here. Hope to see you next week!
“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.
His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”