Live event

3 Pen Tests Every Organization Should Run

A penetration test is often referred to broadly as an evaluation of an organization’s cybersecurity through the uncovering and exploitation of security weaknesses. However, this doesn’t mean there is only one way to pen test. Since vulnerabilities can exist anywhere—operating systems, services and application flaws, improper configurations, or even risky end-user behavior—multiple types of pen tests have been developed to ensure every aspect of the IT infrastructure is secure.

Since many organizations may not have enough time, budget, or expertise to run every type of pen test, how do you know which ones to choose? In this webinar, cybersecurity expert Bob Erdman will discuss the three pen tests that should be at the top of your list:

  • Vulnerability scan validations
  • Web application tests using SQL injection and cross site scripting
  • Phishing campaign simulations

Learn why these tests should be prioritized, the most efficient way to run them, and what steps should be taken after they’ve been completed to ensure you can intelligently manage vulnerabilities and strengthen your security.

Feb 01, 2022
10:00 am
Bob Erdman
Meet Your Presenter

Bob Erdman

Associate Director of Development

Bob leads the Development team for Core Security's cyber threat prevention solutions.