Log4j: Another Call for Vulnerability Management: An HBK Risk Advisory Services Webinar

Date January 18, 2022
Article Authors

Date: January 26, 2022

Time: 12:00 PM – 1:00 PM EST

Host: William J. Heaven, CPA/CITP, CISA, CSCP, Senior Director

Special Guest: Damon Hacker, President & CEO, Vestige Digital Investigations

The Log4j vulnerability (Apache Logging Tool) was discovered in early December 2021. Also referred to as “Log4Shell,” the vulnerability is yet another incentive for businesses to become and remain vigilant against cybersecurity attacks.

Vulnerability Management is an extremely important arrow in your cybersecurity quiver. All too frequently entities are being hacked through vulnerabilities where patches were available but had not yet been applied or implemented.

As we approach the second anniversary of the pandemic lockdowns that have transformed our work and IT landscapes, we need to recognize the ever-increasing significance of security in our expanded IT infrastructure footprint. These new footprints highlight the importance of a proactive approach to eliminating weak spots that could expose our organizations to a cybersecurity attack that could result in downtime, loss of data, or both.

Our January 26th Risk Advisory Services webinar, “Log4j: Another Call for Vulnerability Management,” will feature a discussion of the Log4j Vulnerability and recommendations of how to ensure you have a well-functioning vulnerability management program in place. During the webinar we’ll cover:

  • How to identify evidence of the Log4j vulnerability on your system
  • The characteristics of poor vulnerability management in terms of cybersecurity implications
  • Common oversights in vulnerability management systems
  • Suggestions from our webinar team to identify and prevent downtime due to common vulnerabilities
  • The principles of a “best practice” vulnerability management process

Join me and cybersecurity expert Damon Hacker, President and CEO of Vestige Digital Investigations, for insights on characteristics of an appropriate vulnerability management program.

Register today!

Speak to one of our professionals about your organizational needs

"*" indicates required fields

HBK uses the contact information you provide to send you information about our products and services. You may unsubscribe from these communications any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.