January 15, 2017 — Logan takes the audience through the structure of a WordPress site’s security posture, dispelling common misconceptions and elaborating on perceived security overlaps. The session explains the differences between plugin-based security and external solutions, as well as how they best work together. In easy-to-understand terms, Logan also touches on basic hosting configuration best practices and security control spheres. Whether just getting started in WordPress or a seasoned developer, this talk has something for every WordPresser.
October 6, 2016 — Security Professional Logan Kipp guides you through the process of securing your WordPress website for the first time, security best practices, and establishing a proper security posture. After learning about the basics, we’ll proceed on to discuss more intermediate technologies such as two-factor authentication, web application firewalls, and more. This talk caters to beginners and intermediate WordPress users.
September 25, 2016 — Logan takes the audience through the structure of a WordPress site’s security posture, dispelling common misconceptions and elaborating on perceived security overlaps. The session explains the differences between plugin-based security and external solutions, as well as how they best work together. In easy-to-understand terms, Logan also touches on basic hosting configuration best practices and security control spheres. Whether just getting started in WordPress or a seasoned developer, this talk has something for every WordPresser.
April 26, 2016 — Although many times an afterthought, security should be built into a website from the beginning of the development process. From Binod and Logan’s research, a comprehensive discussion will be had about how to protect a website from its inception. Binod and Logan will take attendees through best practices of secure product development, including how to incorporate White box testing to ensure code security and real-life examples will be presented. Finally, Binod and Logan will share insight on post-deployment and how to monitor and patch websites—mitigating future attacks.