How bleeding-edge client-side protection models align with the NIST's Cybersecurity Framework
When:
Thursday, June 16, 2022
6:00 am PDT / 9:00 am EDT / 2:00 pm BST
Web app client-side attacks pose a unique challenge for companies and web security professionals. The use of JavaScript in the digital supply chain among 97% of all websites offers a large attack surface for malicious actors to exploit. With JavaScript having no notion of permission, and no native way to monitor and manage execution, the freedom to exploit skimming behaviors is prevalent.
Security frameworks such as NIST’s CSF 1.1 offer guidance to security professionals on the best ways to manage, mitigate, and prevent security incidents. This is true for server-side, client-side, internal, and external threats. With five core functions and countless categories and sub-categories, navigating CSF and how it relates to client-side attacks can be a challenge.
When it comes to digital supply chain security, detection-only methodologies are the norm, but they add extra burden to already overburdened security teams. Explore how proactive protection models helps bolster overall digital supply chain security according to the NIST’S CSF.
Join our Sr. Research Engineer, Randy Paszek, for a discussion on:
- A brief history of JavaScript
- Research into NIST CSF
- how it pairs to proactive protection methodology (versus detect-and-alert only) and client-side attacks as a whole
Register now for immediately useful insights that you can apply to your organization's client-side security!