The Log4j Vulnerability: What You Need to Know to Protect Your Business
Webinar | 12.17.21, 7:00 AM EST - 8:00 AM EST
Please join us for a panel on the Log4j Vulnerability and what you need to know to protect your business.
What happened?
Over the past week, a remote code execution vulnerability in a very popular logging library, known as Log4j, started a race against the clock as security teams scramble to patch or remediate the vulnerability. At the same time, threat actors are actively scanning the globe for vulnerable systems and developing exploits. Found in Apache – a free, open source, and reliable web server framework that likely powers over two-thirds of the Internet’s web servers – Log4j allows application developers to keep track of what is happening on Internet-enabled applications. The ubiquity of Log4j itself is a problem. Combined with the fact that all an attacker must do to run remote, untrusted code on a third-party system is send a string of letters and numbers that Log4j processes, there is great potential for this vulnerability to cause widespread disruption.
What do you need to know now?
Our expert panel will address:
- The current state of the vulnerability and implications;
- Threat actor exploitation and current activities;
- Strategies for management third party and vendor risk;
- Approaches for remediating and patch management issues of the Log4j vulnerability.
For more information, please visit these areas: Privacy and Cybersecurity
Contact
Insights
Webinar | 05.14.26
Because of recent changes to Federal and State law regulations, companies that manufacture, import, sell, or distribute products or equipment with components that contain certain “PFAS” materials face imminent and overlapping compliance obligations. This webinar will provide actionable information companies can use to determine whether they are impacted by these State and Federal requirements as well as practical advice for complying with these obligations. Topics that will be covered include the following:
Webinar | 29 April 2026, 3:00-4:30 pm CEST
Webinar | 04.21.26
From Covert to Kinetic: Escalating Cyber Threats in a Time of Conflict
