On-Demand Webinars

2015 Stats Report Explained

In this data-rich one-hour webinar Jeremiah Grossman, founder of WhiteHat Security, presents findings from the 2015 Website Security Statistics Report. The report, generated by examining vulnerabilities in more than 30,000 websites under WhiteHat’s Sentinel management, provides unique perspectives on the state of website security.

Learn More

On-Demand Webinars

How Bad Can Adversaries Get

In this webinar we will cover ways to counteract new rapid-paced hacking techniques, how adversaries are gaining pace with new tools and tactics, and why the old mantra of quarterly scanning to detect and patch may not work in the future.

Learn More

On-Demand Webinars

No More Snake Oil

In this webinar, Jeremiah Grossman, founder of WhiteHat Security, will address: Recent breaches and the financial impact to those organizations, statistics on vulnerabilities, remediation time, and how financial guarantees benefit customers.

Learn More

On-Demand Webinars

Top 10 Web Hacking Techniques of 2014

The Top 10 Web Hacks Webinar, now in its ninth year, represents exhaustive research conducted by a panel of experienced security industry professionals.  In this webinar, you will learn: The top web hacks, ranked by your peers and a panel of industry experts; How to protect your organization against these attacks; Industry wide research on new advanced attack techniques  

Learn More

On-Demand Webinars

Vulnerability Chaining

Attackers chain low and moderate vulnerabilities together to exploit applications, taking advantage of issues that often go un-addressed. Learn how to use this technique to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application.

Learn More

On-Demand Webinars

Vulnerability Remediation

WhiteHat Security and 451 Research help your team explore remediation and how to improve organizational processes. Also learn how WhiteHat Security can be your partner in helping your team to not only identify, but also to fix, vulnerabilities through a combination of technology and expertise.

Learn More

On-Demand Webinars

How Bad Can Zero Days Get

This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control. 

Learn More