All too often, security is stuck in the 1960’s doing slow desk checks, the results of which are usually out of date before the PDF report is dropped on an auditors desk. If a developer sees this report, it’s usually full of hot garbage. Security folks must become agile, become developers themselves and helping building secure applications, not critiquing and using recommendations from the last century. In this talk, learn about how you can contribute data and better remediation steps, and or use modern evidence based standards such as the forthcoming OWASP Top 10 2020 and the OWASP Application Security Verification Standard 4.0 in your development pipeline. If you are a security professional, you’ve probably heard this all before, but still we persist in doing the wrong things. Let’s not do security like it’s 1998, and build assurance in from the get go, and with each and every build.

Hora

19:00 - 20:00 hs GMT+1

Organizador

Synopsys Software Integrity Group (SIG)
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 825 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020