{"id":56452,"date":"2022-02-23T04:18:01","date_gmt":"2022-02-23T04:18:01","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56452"},"modified":"2023-06-05T07:08:23","modified_gmt":"2023-06-05T07:08:23","slug":"web-application-security-best-practices","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/","title":{"rendered":"How Enterprises Can Secure Their Web Application Against Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56452\" class=\"elementor elementor-56452\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5feae1d7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5feae1d7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-761b14e6\" data-id=\"761b14e6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20b8f880 elementor-widget elementor-widget-text-editor\" data-id=\"20b8f880\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> February 22, 2022<br \/><strong>Time:<\/strong> 9 a.m. MST\/8 a.m. PST\/5 p.m. CEST\/9:30 p.m. IST<br \/><strong>Topic:<\/strong> How Enterprises Can Secure Their Web Application Against Attacks<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>To effectively protect your organization\u2019s web applications against cyberattacks, it is necessary to take a multidimensional approach. In this webinar, a panel of industry experts will discuss key measures that enterprises can take to mitigate web application security risks, including incorporating DevSecOps from design through implementation, using web application penetration testing to plug vulnerabilities, and improving incident detection and response.<\/p><p>Enterprises can adopt DevSecOps as a methodology and integrate cybersecurity practices such as secure coding into the development life cycle (design, development, testing, release, and maintenance). This ensures that there is no delay in mitigating cybersecurity risks, since secure application rollouts are less susceptible to threats like hacks by malicious actors.<\/p><p>Expert penetration testing professionals test applications to find vulnerabilities and ensure that cybersecurity loopholes can be plugged before malicious hackers can exploit them. Penetration testing can be conducted on applications before rollout and on live applications to continuously improve their security. Every web application should have a sound incident detection and response plan with clear security policies, effective tools, and steps that can be taken to recover from an attack as soon as possible.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Integrate security management into your web application development life cycle<\/li><li>Use penetration testing to address web application vulnerabilities<\/li><li>Implement an effective incident detection and response plan<\/li><li>Get insights into industry standards, best practices, and processes for web application security<\/li><\/ul><p><strong>Moderator :<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Dragan-Pleskonjic.jpg.webp\" alt=\"Dragan Pleskonjic\" width=\"200\" \/><strong>Dragan\u202fPleskonjic, <\/strong>Senior Director of Application Security at IGT (formerly GTECH)<\/p><p><strong>Bio: <\/strong>In his current role, Dragan\u202fPleskonjic\u202fdirects, coordinates, and oversees application security efforts at the global level. Dragan is a well-known expert and influential strategic thinker in the fields of information security, privacy, machine learning (ML), and artificial intelligence (AI). He is an experienced leader who has held top positions at international companies. He has worked with clients and partners around the world in a variety of sectors, including finance and banking, technology, telecommunications, gaming, education, and government. In addition to his extensive experience creating and managing startups and overseeing new business development, he has a proven history of leadership and talent in creating, managing, and organizing successful teams.<\/p><p>Dragan has also served as an adjunct professor of cybersecurity and computer science and is the author of 10 books, including university textbooks on cybersecurity, operating systems, and software. In addition to being an inventor with patents granted by the USPTO,\u202fCIPO, EPO, and WIPO, he has published over 80 papers in scientific and technical journals and conferences.<\/p><p>His research and development efforts focus\u202fon\u202fintelligent predictive security (INPRESEC) and exploring the paradigm shift in information security and privacy with AI and ML. Dragan is the initiator and founder of many products, solutions, and\u202fresearch projects, including the INPRESEC project,\u202fGlog, and Security Predictions.<\/p><p><strong>Panelists :<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/David-Kosorok.jpg.webp\" alt=\"David Kosorok\" width=\"200\" \/><strong>David Kosorok, <\/strong>Director of Application Security at Hyland Software<\/p><p><strong>Bio: <\/strong>David Kosorok is responsible for application security at Hyland Software. He has over 25 years of experience in software and security testing and over 13 years of experience in security specifically. Before joining Hyland, David led application security and vulnerability management teams at DocuSign and pioneered application security programs at Align Technologies, SAP Concur, the Church of Jesus Christ of Latter-day Saints, and several startups.<\/p><p>David holds several professional security certifications, including C|HFI and C|EH, as well as a Master of Science in information security and assurance. He has also been a volunteer beta editor for PenTestMag for several years and recently joined EC-Council\u2019s Global Advisory Board for Certified Application Security Engineer (CASE). When he\u2019s not reading great sci-fi and fantasy novels or struggling to write one with his brother, David enjoys volunteering in his community, hiking, camping, and generally enjoying the outdoors.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/rory_mcentee.jpg.webp\" alt=\"rory mcentee\" width=\"200\" \/><strong>Rory McEntee, <\/strong>Vice President of Application Security at Protego Trust Bank<\/p><p><strong>Bio: <\/strong>Rory McEntee has been a security professional for over 13 years and lives in the Pacific Northwest. He spent five years in the Army, including a couple of tours to Iraq. He then completed a Bachelor of Science in computer science at Evergreen State while being an active member of the competitive cyber defense team the GNU-E-Ducks. After college, he worked as an intern on an application security team and has been hooked on AppSec ever since. Rory has managed application security programs at SAP Concur and DocuSign. Rory has two cats, Taco and Rocco, who fight crime and sometimes commit it. He plays golf and enjoys traveling.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Os3KP1mLKh4\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 22, 2022Time: 9 a.m. MST\/8 a.m. PST\/5 p.m. CEST\/9:30 p.m. ISTTopic: How Enterprises Can Secure Their Web Application Against Attacks Watch Now Abstract: To effectively protect your organization\u2019s web applications against cyberattacks, it is necessary to take a multidimensional approach. In this webinar, a panel of industry experts will discuss key measures that&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79065,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56452","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Web Application Security for Organizations: Best Practices<\/title>\n<meta name=\"description\" content=\"Web application attacks are a growing problem. In this webinar, get insights from a panel of industry experts on securing your organization&#039;s web applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Enterprises Can Secure Their Web Application Against Attacks\" \/>\n<meta property=\"og:description\" content=\"Web application attacks are a growing problem. In this webinar, get insights from a panel of industry experts on securing your organization&#039;s web applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-23T04:18:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:08:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"How Enterprises Can Secure Their Web Application Against Attacks\",\"datePublished\":\"2022-02-23T04:18:01+00:00\",\"dateModified\":\"2023-06-05T07:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/\"},\"wordCount\":784,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/\",\"name\":\"Web Application Security for Organizations: Best Practices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg\",\"datePublished\":\"2022-02-23T04:18:01+00:00\",\"dateModified\":\"2023-06-05T07:08:23+00:00\",\"description\":\"Web application attacks are a growing problem. In this webinar, get insights from a panel of industry experts on securing your organization's web applications.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-security-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How Enterprises Can Secure Their Web Application Against Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Web Application Security for Organizations: Best Practices","description":"Web application attacks are a growing problem. In this webinar, get insights from a panel of industry experts on securing your organization's web applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"How Enterprises Can Secure Their Web Application Against Attacks","og_description":"Web application attacks are a growing problem. In this webinar, get insights from a panel of industry experts on securing your organization's web applications.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-02-23T04:18:01+00:00","article_modified_time":"2023-06-05T07:08:23+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"How Enterprises Can Secure Their Web Application Against Attacks","datePublished":"2022-02-23T04:18:01+00:00","dateModified":"2023-06-05T07:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/"},"wordCount":784,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/","name":"Web Application Security for Organizations: Best Practices","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg","datePublished":"2022-02-23T04:18:01+00:00","dateModified":"2023-06-05T07:08:23+00:00","description":"Web application attacks are a growing problem. In this webinar, get insights from a panel of industry experts on securing your organization's web applications.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/How-Enterprises-Can-Secure_Panel-Discussion-Banner-465x310-1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"How Enterprises Can Secure Their Web Application Against Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56452"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79065"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}