Proactive Planning for Old, New, and Emerging Security Vulnerabilities

Thank you for your submission. Check your inbox for an email from F5 that will include a link to access the content you requested.

Date: Thursday, January 27, 2022

Time: 10:00 AM PT | 1:00 PM ET

Accellion, Solar Winds, and Log4Shell are just a few in a long list of security vulnerabilities that have kept defenders busy around the clock. For many enterprises, remediation is difficult – or worse, non-existent – leading to compromise through vulnerabilities that are sometimes years old, even though patches are available.

Knowing the right steps to take can be tough. So how can your organization find the right way to proactively protect its applications and data from attacks exploiting past, current, and even future vulnerabilities? 

Join F5 for this fireside chat as we uncover:

The Log4Shell, Accellion, and Solar Winds vulnerabilities

The differences and similarities between these risks

Proactive strategies to mitigate past, present, and future vulnerabilities

F5 products that can be a part of an effective defense


Malcolm Heath
Sr. Threat Researcher
F5 Labs

Aaron Brailsford
Principal Security Engineer

Peter Scheffler
Senior Solutions Architect