Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore vulnerability management implementation through DefectDojo in this 39-minute conference talk from the 38th Chaos Communication Congress (38C3). Learn the fundamentals of vulnerability management workflow integration, from initial detection using tools like Trivy, Clair, Nessus, Sonar, and OWASP dependency tracker, to effective management and mitigation strategies. Discover how DefectDojo streamlines the process by consolidating reports, eliminating duplicate findings, handling false positives, and facilitating integration with development tracking software like Jira. Gain practical insights from a medium-sized critical infrastructure company's implementation, understanding the advantages and real-world applications of this open-source vulnerability management tool.
Syllabus
38C3 deu - Vulnerability management with DefectDojo
Taught by
media.ccc.de