May 5, 2021
Best Practices for Web Application Security

Vulnerable applications are the top attack vector in externally caused data breaches.

Technology alone is not enough to ensure adequate application security—you need cultural change, tactical operations, and strategic focus to beat increasingly sophisticated attacks on your web applications. We can help.

Read our new eBook and see how an approach based on testing is key to protecting your applications and your brand. Learn how you can gain a solid understanding of the scope, objectives and priorities of your organization’s application security program, and keep web apps protected on-premises and in the cloud.

Download our eBook and learn the best practices for web app security success.

About the Authors
Anne Grahn
Anne Grahn
Director | Corporate Communications & Content
As Director of Communications & Content, Anne Grahn works with CBI's executive leadership to develop and execute cohesive cybersecurity messaging and thought leadership initiatives. She has more than a decade of experience in information security, and extensive writing and editing expertise. She previously held cybersecurity communications positions at Sirius Computer Solutions and SHI International, and maintains a CISSP certification.
CBI - Shaun Bertrand
Shaun Bertrand
Chief Services Officer
Shaun Bertrand leads the Red Team, CBI’s Advanced Testing Services practice. Shaun brings over 20 years of experience in the information security field with a core focus of providing penetration testing and vulnerability assessment services to enterprise organizations. Shaun has been CISSP certified since 2004 and is proficient in several technical services including AV obfuscation, social engineering, exploit development, critical systems protection, endpoint security, event management, incident response, intrusion detection, ICS/SCADA, and malware prevention. Shaun has taught security classes at the University of Michigan and Eastern Michigan University and is a frequent speaker at security conferences and local hacking groups.
I Need To...