Application Security: Getting the Most Out of Your Penetration Tests

Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.

}

Register to Watch Video

By submitting this form, you indicate that you have read and agree to the terms of our Privacy Policy.

Application pen tests are a substantial investment of time, money, and resources - so it is crucial that your organization understands how to make the most of it. Knowing what questions to ask from start to finish will set you up for success to reap the rewards of comprehensive pen testing results and remediation strategies.

Join Dan Petro, veteran penetration tester and Lead Researcher at Bishop Fox, as he guides you through the fundamentals of pen testing and things you should consider during each phase of the process. Whether you are new to pen testing or have been involved in dozens of engagements, we will offer our top recommendations to ensure a valuable application pen testing engagement.

Join our webcast to learn:

  • Key aspects of pen testing
  • Questions to ask during the process
  • How to evaluate vendors
  • Top tips for a successful engagement

Dan Petro Headshot

About the speaker, Dan Petro

Senior Security Engineer

As a senior security engineer for the Bishop Fox Capability Development team, Dan builds hacker tools, focusing on attack surface discovery. Dan has extensive experience with application penetration testing (static and dynamic), product security reviews, network penetration testing (external and internal), and cryptographic analysis. He has presented at several Black Hats and DEF CONs on topics such as hacking smart safes, hijacking Google Chromecasts, and weaponizing AI. Dan holds both a Bachelor of Science and a Master of Science in Computer Science from Arizona State University.

More by Dan

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.