Join us for an interactive webinar to learn about Digital Security and Trust’s web application security capabilities using Burp Suite DAST. This recently implemented, university-owned tool can be used by colleges and departments to scan web applications for common vulnerabilities including issues found in the OWASP Top 10.
Build security into your software development lifecycle and empower your team to address issues before they become risks.
In this session, we will:
- Display the capabilities of Burp Suite DAST, a robust tool for identifying vulnerabilities in web applications
- Walk through the features and benefits of the tool, including college/department-level visibility, integration with risk dashboards, and flexible scanning options for web services on multiple platforms
- Present practical insights on configuration, scan scheduling, and deconflicting web log activity, along with guidance on firewall rules and onboarding processes
Don’t miss this chance to take your web security efforts to the next level—register today and bring your questions!
For medical center colleagues, please log into the registration page with your name.#@osu.edu credentials.
Presenters:
Bob Pardee, Security Engineer Senior: Bob is a member of the Digital Security and Trust team working with units to develop a scope of testing, conduct a technical assessment, and report assessment results. These activities include penetration testing, code reviews, red teaming and other adversarial testing. Bob was instrumental in providing a way for units to learn more about the health of their web applications, and receiving guidance on how to remediate potential security issues.
Reg Jackson, Security Engineer: Reg is a member of Ohio State’s Digital Security and Trust (DST), which is part of the Office of Technology and Digital Innovation. He focuses on education and outreach by training students, faculty, and staff to maintain and secure our computing environments and to live safer digital lives. Reg will serve as emcee for this event and will cover foundational concepts like the Information Security Control Requirements as well as the support and services offered by DST to meet challenges faced by units as they work to protect institutional data.