reflectiz-news, webinar
Reflectiz | The Hidden Risks of Third-Party Apps on Websites

Webinar
The Hidden Risks of Third-Party Apps on Websites
Thursday 9 July |
This event has ended.
Watch the recording below.
Learn everything you need to know about the invisible dangers of third-party apps on websites. We’ll take you all the way from detection to effective mitigation. You will meet Magecart attacks, learn why you are accountable for third-parties and find out how to avoid financial losses.
Agenda:
-
Short background
-
Everything you need to know about third-party apps
-
Third-party risks you cannot afford to miss
-
Magecart hacking group and Web-Skimming
-
Famous third-party attacks
-
Avoiding the risk
-
Security controls: Static Vs. Dynamic
-
CSP and code review
-
Storage: internal or external
Watch the recording HERE:
Book a Demo from Reflectiz HERE
SPEAKER PROFILE:

Idan Cohen
CEO, Reflectiz
Idan is the CEO & Co-founder of Reflectiz, a cyber-security company that provides a security solution for websites against third-party threats. Idan is a former Cyber IDF officer, with over a decade of Information Security expertise. Leading roles: CTO at Bugsec Offensive Security and at Cynet (a cybersecurity company).
Reflectiz’ security solution protects websites from next generation third-party application threats, such as client-side attacks, web skimming, Magecart attacks, data breaches and privacy violations. The company brings a clear vision of helping organizations solve the growing third-party security and privacy risks on their websites, by creating a seamless and fully automated solution, with no prior setup, no integration requirements and no maintenance. Founded in 2016, Reflectiz already works with a growing number of clients globally, from the financial sectors, e-commerce, insurance and healthcare, telecoms, e-services and more.

Questions related to Third-party apps
Third-party apps
-
Why they are essential but also risky at the same time?
-
The tools we all know and use
-
What’s that running? How we install our third-parties and what they really can do
Under attack
-
How attackers compromise third-parties to steal your data
-
Hiding techniques; Web-Skimming
-
The Magecart hacking groups
-
Some famous third-party attacks you didn’t realize
How can you solve the growing risk?
-
-
Your security controls: Static Vs. Dynamic
-
What is CSP and does your code review fits?
-
Storage tips: internal or external
-