Skip to Main Content

Log4j: Live Update Webcast

During the webcast, we will be joined by David Kennedy, TrustedSec CEO & Binary Defense CTO, Randy Pargman, Binary Defense Vice President of Threat Hunting & Counterintelligence, Tyler Hudak, TrustedSec Incident Response Practice Lead, and, Justin Elze, CTO & Director of Innovation, Research, & Advanced Testing.

By David Kennedy, Tyler Hudak and Justin Elze
December 14, 2021
Incident Response Vulnerability Assessment

Presented by TrustedSec & Binary Defense on December 14, 2021.

During this live webcast we are covering the latest news and guidance on the Log4j vulnerability and what organizations can do to detect and respond to it. We will discuss how the vulnerability works with a quick demo, detecting attacks, and how you can respond with prevention or mitigation. Given the nature of this vulnerability and how quickly the information around it is changing, we will be presenting updates and answering questions live during this event.

Last week a severe vulnerability for Apache Log4j was released (CVE-2021-44228). This vulnerability, also known as Log4Shell, allows remote code execution in many applications through web requests and without authentication. Almost immediately, many attackers on the Internet began to scan and exploit this vulnerability. We’ve been tracking the vulnerability and providing direction and recommendations that organizations can use to prevent, detect, and mitigate this vulnerability.

During the webcast, we will be joined by David Kennedy, TrustedSec CEO & Binary Defense CTO, Randy Pargman, Binary Defense Vice President of Threat Hunting & Counterintelligence, Tyler Hudak, TrustedSec Incident Response Practice Lead, and, Justin Elze, CTO & Director of Innovation, Research, & Advanced Testing.

Resources:

TrustedSec Blog: Log4j Detection and Response Playbook
Binary Defense Blog: Advice for Defenders Responding to the log4j Vulnerability CVE-2021-44228