As the cyber threat landscape evolves and external dependencies grow more complex, managing risks to enterprises and connected embedded systems requires more than reactive measures. Many organizations are proactively reducing their attack surfaces both in their cyber supply chain and in assets being targeted for exploitation. This is particularly significant for network-connectable devices. The Internet of Things (IoT) is contributing to a massive proliferation of a variety of types of software-reliant, connected devices throughout critical infrastructure sectors. Testing can provide the information needed to determine “fitness for use” and trustworthiness of assets. IT asset management should leverage automated means for detecting weaknesses and vulnerabilities in software. Addressing cyber supply chain dependencies enables enterprises to harden their attack surface by comprehensively identifying exploit targets, understanding how assets are attacked, and providing more responsive mitigations. Security automation tools and services, testing, and certification programs now provide means for organizations to reduce risk exposures attributable to exploitable software. This presentation addresses means for using information to prioritize mitigation efforts focused on reducing exploitable attack vectors, thus enabling organizations to proactively harden their attack surface and become more resilient in the face of growing threats and asymmetric attacks. Joe Jarzombek is Director for Government, Aerospace & Defense Programs in Synopsys, Inc. He guides efforts to focus Synopsys’ global leadership in electronic design automation (EDA), silicon IP, and software security and quality solutions on addressing the needs of the public sector and the aerospace and defense communities. Jarzombek has over 30 years’ experience focused on software security, safety, and quality in embedded and networked systems and enterprise IT.

Hora

18:00 - 19:00 hs GMT+1

Organizador

Synopsys Software Integrity Group (SIG)
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2019 692 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 27 de Junio de 2019
Mar 28 de Junio de 2019
Mié 29 de Junio de 2019
Jue 30 de Junio de 2019
Vie 31 de Junio de 2019
Sáb 01 de Junio de 2019
Dom 02 de Junio de 2019
Lun 03 de Junio de 2019
Mar 04 de Junio de 2019
Mié 05 de Junio de 2019
Jue 06 de Junio de 2019
Vie 07 de Junio de 2019
Sáb 08 de Junio de 2019
Dom 09 de Junio de 2019
Lun 10 de Junio de 2019
Mar 11 de Junio de 2019
Mié 12 de Junio de 2019
Jue 13 de Junio de 2019
Vie 14 de Junio de 2019
Sáb 15 de Junio de 2019
Dom 16 de Junio de 2019
Lun 17 de Junio de 2019
Mar 18 de Junio de 2019
Mié 19 de Junio de 2019
Jue 20 de Junio de 2019