1. Home
  2. |Insights
  3. |The Log4j Vulnerability: What You Need to Know to Protect Your Business

The Log4j Vulnerability: What You Need to Know to Protect Your Business

Webinar | 12.17.21, 7:00 AM EST - 8:00 AM EST

Please join us for a panel on the Log4j Vulnerability and what you need to know to protect your business.


What happened?


Over the past week, a remote code execution vulnerability in a very popular logging library, known as Log4j, started a race against the clock as security teams scramble to patch or remediate the vulnerability. At the same time, threat actors are actively scanning the globe for vulnerable systems and developing exploits. Found in Apache – a free, open source, and reliable web server framework that likely powers over two-thirds of the Internet’s web servers – Log4j allows application developers to keep track of what is happening on Internet-enabled applications. The ubiquity of Log4j itself is a problem. Combined with the fact that all an attacker must do to run remote, untrusted code on a third-party system is send a string of letters and numbers that Log4j processes, there is great potential for this vulnerability to cause widespread disruption.


What do you need to know now?


Our expert panel will address: 


  • The current state of the vulnerability and implications;
  • Threat actor exploitation and current activities; 
  • Strategies for management third party and vendor risk;
  • Approaches for remediating and patch management issues of the Log4j vulnerability.

For more information, please visit these areas: Privacy and Cybersecurity

Insights

Webinar | 06.11.24

Consilio Symposium 2024

Ian Schuler will be speaking on the panel, "An Evolving Playbook: Privilege Protection and Logging.” The discussion will explore strategies for identifying privileged materials, including analytic tools and TAR, and approaches to logging privileged materials, including categorical logs and other types.