Contextualize to React: ADR in the Service of Incident Response
Course
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Application security tools generate overwhelming noise while missing critical threats. Traditional approaches analyze fragmented components - code, libraries, requests - without understanding how applications function. Developers spend 20% of their time on security tasks, while web application firewalls detect thousands of suspicious events but lack context to identify the three genuine attacks buried within.
Application detection and response addresses this gap by injecting agents directly into running applications to observe real-time behavior in production environments. Rather than simulating threats in test environments, ADR analyzes actual user interactions, API calls and data flows to build application graphs that detect deviations from normal operation.
This session, led by Aurélien Svevi, solutions engineer at Contrast Security, will cover:
- Correlating attacks with underlying vulnerabilities to prioritize remediation;
- Reducing false positives by validating whether malicious data reaches databases;
- Deploying across microservices architectures without recompilation.
Here is the course outline:
Contextualize to React: ADR in the Service of Incident Response |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |