{"id":84192,"date":"2023-12-07T13:00:49","date_gmt":"2023-12-07T21:00:49","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/webinar-lp-template-231129-copy\/"},"modified":"2024-03-08T09:57:42","modified_gmt":"2024-03-08T17:57:42","slug":"log4j-understanding-and-mitigating-critical-vulnerabilities","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/","title":{"rendered":"Log4J: Understanding &#038; Mitigating Critical Vulnerabilities Webinar"},"content":{"rendered":"<p>WEBINAR<\/p>\n<h1>Log4J: Understanding &amp; Mitigating Critical Vulnerabilities<\/h1>\n<p>\n\u00a0\n<p>The shockwave caused by the Apache Log4j vulnerability\u2019s revelation still resonates, scoring a perfect 10 for severity (CVSS score) and reaching far and wide. Yet, amid the holiday season\u2019s clamor, many organizations stumbled in their response. Are you geared up for the next major vulnerability?<\/p>\n<p>Join this exclusive webinar to unravel the aftermath of Log4j alongside industry experts. Explore vital insights and proactive measures to fortify your defenses before the next vulnerability strikes.<\/p>\n<h4 style=\"color:#009dea\">Featured Speakers:<\/h4>\n<p>        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/07\/Ellen-Amanda-Small-768x768-1.png\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-46206\" style=\"width:100%;height:auto\"><\/p>\n<p style=\"text-align: center\"><strong>Ellen Sundra<\/strong>Chief Customer OfficerForescout<\/p>\n<p>        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/shawn-taylor-in-circle.png\" alt=\"\" width=\"300\" height=\"300\" class=\"alignnone size-medium wp-image-46206\" style=\"width:100%;height:auto\"><\/p>\n<p style=\"text-align: center\"><strong>Shawn Taylor<\/strong>VP, Threat DetectionForescout<\/p>\n\n<h5 style=\"color:#009dea\">Here\u2019s what we\u2019ll cover:<\/h5>\n<ul>\n<li>Unveiling Log4j Lessons: Discover invaluable insights from the Log4j incident and extract key learnings.<\/li>\n<li>Importance of Comprehensive Asset Management: Learn about the critical need for complete hardware and software asset management, coupled with continuous assessment.<\/li>\n<li>Rapid Response Strategies: Explore ways to swiftly detect compromises, accelerate incident response, and foster trust in resolutions<\/li>\n<\/ul>\n<p><a target=\"_blank\" href=\"\/company\/legal\/notice-of-collection\/\" rel=\"noopener\">Notice of Collection<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WEBINAR Log4J: Understanding &amp; Mitigating Critical Vulnerabilities \u00a0 The shockwave caused by the Apache Log4j vulnerability\u2019s revelation still resonates, scoring a perfect 10 for severity (CVSS score) and reaching far and wide. Yet, amid the holiday season\u2019s clamor, many organizations stumbled in their response. Are you geared up for the next major vulnerability? Join this [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":84268,"parent":84198,"menu_order":204,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-84192","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4j Aftermath: Prepare for Vulnerability - Forescout<\/title>\n<meta name=\"description\" content=\"Uncover Log4j impact, proactive measures, rapid response tactics. Prepare your defense! Join our exclusive webinar now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4j Aftermath: Prepare for Vulnerability - Forescout\" \/>\n<meta property=\"og:description\" content=\"Uncover Log4j impact, proactive measures, rapid response tactics. Prepare your defense! Join our exclusive webinar now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T17:57:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/\",\"url\":\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/\",\"name\":\"Log4j Aftermath: Prepare for Vulnerability - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png\",\"datePublished\":\"2023-12-07T21:00:49+00:00\",\"dateModified\":\"2024-03-08T17:57:42+00:00\",\"description\":\"Uncover Log4j impact, proactive measures, rapid response tactics. Prepare your defense! Join our exclusive webinar now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinars\",\"item\":\"https:\/\/www.forescout.com\/webinars\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Log4J: Understanding &#038; Mitigating Critical Vulnerabilities Webinar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4j Aftermath: Prepare for Vulnerability - Forescout","description":"Uncover Log4j impact, proactive measures, rapid response tactics. Prepare your defense! Join our exclusive webinar now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Log4j Aftermath: Prepare for Vulnerability - Forescout","og_description":"Uncover Log4j impact, proactive measures, rapid response tactics. Prepare your defense! Join our exclusive webinar now.","og_url":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-03-08T17:57:42+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/","url":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/","name":"Log4j Aftermath: Prepare for Vulnerability - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png","datePublished":"2023-12-07T21:00:49+00:00","dateModified":"2024-03-08T17:57:42+00:00","description":"Uncover Log4j impact, proactive measures, rapid response tactics. Prepare your defense! Join our exclusive webinar now.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/webinars\/log4j-understanding-and-mitigating-critical-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Webinars","item":"https:\/\/www.forescout.com\/webinars\/"},{"@type":"ListItem","position":3,"name":"Log4J: Understanding &#038; Mitigating Critical Vulnerabilities Webinar"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-Next-Log4J-v1-1200x628-1.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=84192"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84192\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/84268"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=84192"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=84192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}