Although there are a variety of application security technologies, there is no silver bullet. You need to gather the strengths of multiple analysis techniques along the entire application lifetime — from development to testing to production — to drive down application risk. Each testing type, from static to dynamic to software composition analysis and manual pen testing, has different strengths and weaknesses and are better in different scenarios, but you won’t be effective without taking advantage of them all. Join this session to understand the strengths and weaknesses of the different AppSec testing types, how they work together, and how to get started. About the speaker: Chris Kirsch works on the products team at Veracode and has 22 years of experience in security, particularly in the areas of application security testing, security assessments, incident response, and cryptography. Previously, he managed Metasploit and incident response solutions at Rapid7 and held similar positions at Thales e-Security and PGP Corporation. He is the winner of the Social Engineering CTF Black Badge competition at DEF CON 25. This session is part of Veracode's "Your AppSec Game Plan" Summit.

Hora

12:00 - 13:00 hs GMT+1

Organizador

Application Development and Management
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 819 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020