AppSec Phoenix will be live from Black hat (boot 338)

Appsec Phoenix will be at black hat Europe with Application and cloud security unified into an actionable risk-based contextual view.

We will host a raffle on the day and announce the winners on both days. Ask us about appsec phoenix, decypher the cypher and win a special prize. Decypher the code, come and win the special price

Black hat is around the corner, and we will have a busy event with a lot of news and updates. Appsec phoenix will have an important announcement on the day, so don’t miss the live stream.

During the day, we will have a coffee break; come, coffee is on us; being an Italian, you know it will be good.

Italian must-have coffee.

In between coffee breaks, we will have talks, workshops and fireside chats at booth 338 (schedule below)

Appsec phoenix also has a raffle on the day, with winners announced on day 2  

> Live stream available on Linkedin Live, Twitter, and Youtube channel live

Come and join to talk about your application security and cloud security programme. Ask us anything about cloud and application security.

BHD17/12/1110:0010:45Francesco CipolloneCoffee & Appsec – ASK Me Anything
BHD17/12/1111:0011:45Francesco CipolloneFrancesco CipolloneCoffee & Appsec – ASK Me Anything
BHD17/12/1112:0013:00Lunch BreakLunch Break
BHD17/12/1113:0014:00Open Q&AOpen Q&ACoffee & Cloud Security
BHD17/12/1114:0014:45Francesco CipolloneSean TurnerFireside Chat – Cloud security & Challenges
BHD17/12/1115:0015:45Francesco CipolloneGrant Ongers & Sam StepanyanScaling an application security programme – Metrics that matter
BHD17/12/1116:3017:15Francesco CipolloneFrancesco CipolloneCVE / CVSS Land of broken dreams – Context is king
BHD17/12/1116:3017:15Francesco CipolloneFrancesco CipolloneRaffle Ticket & SWAG Giveaway
BHD28/12/1110:0010:45Francesco CipollonePaul HarringtonApplication & Cloud Security – Priorities for a global CISO
BHD28/12/1111:0011:45Francesco CipolloneAndrew PannellFireside Chat – Application Security & Vulnerability Management
BHD28/12/1112:0013:00Lunch BreakLunch Break
BHD28/12/1113:0014:00No Talk
BHD28/12/1114:0014:45No Talk
BHD28/12/1115:0015:45Francesco CipolloneFrancesco CipolloneCVE / CVSS Land of broken dreams – Context is king
BHD28/12/1116:0017:00Raffle Extraction & Prices
AppSec Phoenix Black Hat Schedule and talks

Why AppSec Phoenix

Appsec Phoenix is an innovative risk-based solution that focuses on execution first and brings developers, executives and security around the same data with different lenses and a focus on execution. AppSec Phoenix removes the stress from devsecops and lets developers focus on what’s more important, delivering value to the business with security at the centre.

ask us how here

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Contextual vulnerability management is a comprehensive approach to identifying, analyzing, and mitigating vulnerabilities in software and cloud infrastructure. It involves considering the specific context and environment in which vulnerabilities exist, including the software and hardware components, the network infrastructure, and the organizational policies and processes in place. By adopting this approach, organizations can more effectively assess and mitigate the risks posed by vulnerabilities, helping to protect their assets and maintain the security of their systems and networks.
Francesco Cipollone
Cyber security risk is challenging to calculate. Real-Time context, Cyber threat intelligence, Ownership Vulnerabilities, all part of the same continuum ->
Alfonso Eusebio
In today’s digital world, cyber threats are a real and growing concern for organizations of all sizes. As the threat landscape continues to evolve. we explore in this blog how to threat treats, which one to use in your prioritization strategy
Sally Turner

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

x Logo: ShieldPRO
This Site Is Protected By