Web scanning is already a routine activity for many IT teams. This session takes a step further by looking under the hood at what good web vulnerability scanning actually involves and how to use it more effectively. We will discuss how automated scans identify exposed services, misconfigurations, and known vulnerabilities across internet-facing systems, and what these findings really mean in practice. The session will focus on best practices: setting the right scope and frequency, reducing false positives, prioritizing remediation, and connecting scan results to patching and configuration management. The aim is to help IT managers move from “we run scans” to “we get value from scans.” Since many incidents start with simple, visible weaknesses, improving how scanning is planned, interpreted, and acted upon can meaningfully reduce risk. Participants will leave with a clearer sense of how to make web scanning a more useful and reliable part of their security workflow.
This session will be held in English. Sign up here.
Technical difficulty level: 3/5