Webinars

Secure Agile Through An Automated Toolchain: How Veracode R&D Does It

Security testing is essential. But it’s only embraced when it doesn’t slow down your developers. Veracode's software engineers understand the challenge of building security into the Agile SDLC. We live and breathe that challenge. We use our own application security technology to secure our platform so our developers can go further faster. Automation is key to streamlining our end-to-end process — because manual testing can't keep up with our Agile development velocity (and it doesn't scale).

View the webinar

PCI 3.0: How Third-Party Security Impacts Your Enterprise Risk

Recent breaches show that “doing just enough to comply with PCI” doesn't address your third-party risks. In this webinar you have a chance to learn from two experts who have helped organizations design and build enterprise-wide programs that address risks from both internal and third-party applications.

View the webinar

Building Security into the Agile SDLC: View from the Trenches

To speed time-to-market, most enterprises have adopted agile development in the SDLC. Join Veracode's security and development experts to learn how we've embedded security into our own Agile Scrum processes – to rapidly deliver new applications without exposing them to critical vulnerabilities.

View the webinar

Thomson Reuters: How to implement an application security program for third-party software

Recently the FS-ISAC Third-Party Software Security Working Group developed recommended controls for addressing third-party software security including requiring software vendors to submit binary static analysis reports for the software they supply to an organization.

View the webinar

A Better Approach to Third Party Software Security - Episode 3 Featuring: Chris Wysopal, CTO, Veracode

Third party software is the new perimeter for every financial institution. To address this issue, the FS-ISAC Working Group developed specific recommended controls for third party software security.

View the webinar

A Better Approach to Third Party Software Security - Episode 2 Featuring: Wendy Nather, Research Director

Third party software is the new perimeter for every financial institution. To address this issue, the FS-ISAC Working Group developed specific recommended controls for third party software security.

View the webinar

A Better Approach to Third Party Software Security - Episode 1 Featuring: Jim Routh, CISO

Third party software is the new perimeter for every financial institution. To address this issue, the FS-ISAC Working Group developed specific recommended controls for third party software security.

View the webinar

Mobile Application Security: Trends, Myths, and Answers

Enterprise adoption of mobile apps create significant challenges. According to Forrester Inc., the challenges include how to distribute apps to thousands of end users in a timely, secure, and reliable fashion.

View the webinar

Something the Feds Got Right: Software Supply Chain Security

Stop assuming, start demanding security from your software suppliers. Ignoring the problem of the third party application security will only lead to risk for your enterprise.

View the webinar

7 Days to a Secure Web Perimeter

Get started and identify security risks in the perimeter, implement an actionable plan to mitigate risk, and show immediate progress to your stakeholders.

View the webinar

Anatomy of a Data Breach: Types, impact and prevention

As malicious actors are getting more sophisticated, companies face a growing threat of being breached and consequently losing confidential customer information, IP and trade secrets.

View the webinar

What Are Employees Mobile Apps Doing Behind Your Back?

With all the convenience BYOD brings, have you considered the ramifications of what your employees' apps are up to behind your back?

View the webinar

Work Smarter Not Harder: How you can get more from a mature security program

How do we define application security program maturity? The concept of program maturity means something different to every enterprise, but they all share the need to reduce risk and increase their return on investment (ROI).

View the webinar

5 Steps for a Winning Application Security Program

Why is an application security program important? Learn how to build a successful application security program that can help your company improve testing sustainability, risk transparency, and scalability while controlling costs.

View the webinar

Under Pressure - When clients demand proof of security

As awareness for application security grows, companies are asking their vendors to verify that the applications they are offering are developed using secure coding practices.

View the webinar

Mobilizing the Masses: Building BYOD Security Awareness in your Workplace

It is not uncommon for useful and seemingly harmless mobile applications to perform tasks that are unrelated and unnecessary to the advertised function of the app.

View the webinar

Next Phase of Mobile Security

How is your organization meeting the BYOD challenge? Balancing the need for flexibility and security in a mobile device world is challenging, but critical for organizations.

View the webinar

Understanding the Latest Security Threats

What are the weak points in your IT infrastructure? For many companies, it is the applications on their systems.

View the webinar

We See the Future... and It's Not Pretty

Veracode CTO and Co-Founder, Chris Wysopal addresses what enterprises need to know about the security of their commercial software.

View the webinar

Mobile Security in a BYOD Federal World

In today’s ubiquitous Smart Phone World, most Federal Agencies have adopted a flexible BYOD policy so their employees can use the mobile device of choice. Balancing the need for flexibility and security in a mobile device world is challenging but critical for Federal Agencies

View the webinar

Budgeting for Defense

The Latest Department of Defense budget requires new steps in secure product development.

View the webinar

Don't Ask, Don't Tell: The (In)Security of Vendor-Supplied Software

Study of Enterprise Testing of the Software Supply Chain, a feature supplement to Veracode's State of Software Security Report.

View the webinar

Trust but VerAfy: NSFOCUS on Why Software Providers Need Independent Security Attestation

As a producer and leading provider of perimeter security software in the public sector, NSFOCUS knows the value of independent security verification. By achieving the Veracode VerAfied mark, NSFOCUS has set itself apart from other software companies

View the webinar

Power to the People: Building Your Third-Party Application Security Program

Do you actually know how many third-party applications you use? How do you even define them? Think about third-party services, besides the usual social media sites.

View the webinar

Crafting Super-Powered Risk Assessments

How combining traditional, network, and application assessments can benefit enterprises exponentially with increased better response time and visibility of vulnerabilities.

View the webinar