The Log4j Vulnerability: What You Need to Know to Protect Your Business
Webinar | 12.17.21, 7:00 AM EST - 8:00 AM EST
Please join us for a panel on the Log4j Vulnerability and what you need to know to protect your business.
What happened?
Over the past week, a remote code execution vulnerability in a very popular logging library, known as Log4j, started a race against the clock as security teams scramble to patch or remediate the vulnerability. At the same time, threat actors are actively scanning the globe for vulnerable systems and developing exploits. Found in Apache – a free, open source, and reliable web server framework that likely powers over two-thirds of the Internet’s web servers – Log4j allows application developers to keep track of what is happening on Internet-enabled applications. The ubiquity of Log4j itself is a problem. Combined with the fact that all an attacker must do to run remote, untrusted code on a third-party system is send a string of letters and numbers that Log4j processes, there is great potential for this vulnerability to cause widespread disruption.
What do you need to know now?
Our expert panel will address:
- The current state of the vulnerability and implications;
- Threat actor exploitation and current activities;
- Strategies for management third party and vendor risk;
- Approaches for remediating and patch management issues of the Log4j vulnerability.
For more information, please visit these areas: Privacy and Cybersecurity
Contact
Insights
Webinar | 10.16.25
The landscape of AI governance and regulation is shifting. Following the release of the White House’s “America’s AI Action Plan” in July 2025 and the President’s signing of related Executive Orders, the White House has emphasized (at least rhetorically) a preference for innovation, adoption, and deregulation. But that does not tell the entire story. The Administration remains committed to exercising a heavy hand in AI, including by banning the U.S. government’s procurement of so-called “woke AI,” intervening in the development of data centers and the export of the AI technology stack, imposing an export fee for certain semiconductors to China, and assuming a stake in a U.S. semiconductor company. State legislatures are also racing to implement their own regulations, particularly around AI’s use in critical areas, such as healthcare, labor and employment, and data privacy. The many sources of regulation raise the specter of a fragmented compliance environment for businesses. This webinar will delve into the Administration’s AI strategy, going beyond the headlines to analyze:
Webinar | 09.29.25
False Claims Act and Customs Enforcement—What You Need to Know
Webinar | 09.25.25