Webinars

Beyond Risk Avoidance

Beyond Risk Avoidance: How a Global 2000 Firm Demonstrated the Value of Their Application Security Program

Atlas Venture Explains

Atlas Venture Explains Why You Need to Be a Secure Supplier

Gartner Session Boeign Case Study Supply Chain

Gartner Session - Boeing Case Study: How to Secure the Software Supply Chain

Boeing Case Study

Boeing Case Study: How We Secure 300 Third-Party Applications

IDG Study Majority of Web Apps

IDG Study: Majority of Web Apps Not Assessed for Critical Security Vulnerabilities

A Pragmatic Approach to Benchmarking AppSec

A Pragmatic Approach to Benchmarking Application Security

SANS Webinar Are There Gaps in Your Heartbleed Response Plan

SANS Webinar: Are There Gaps in Your Heartbleed Response Plan?

Are you Only Testing Web Apps in Production

Are You Only Testing Web Apps in Production?

Secure Agile Through Automated Toolchains

Secure Agile Through An Automated Toolchain: How Veracode R&D Does It

How Third-Party Security Impacts Your Enterprise Risk

PCI 3.0: How Third-Party Security Impacts Your Enterprise Risk

Thomson Reuters Hot to Implement an AppSec

Thomson Reuters: How to Implement an Application Security Program for Third-Party Software

Building Security into the Agile SDLC

Building Security into the Agile SDLC: View from the Trenches

A Better Approach to Third-Party Software

A Better Approach to Third Party Software Security - Episode 3 Featuring: Chris Wysopal, CTO, Veracode

A Better Approach to Third-Party Software

A Better Approach to Third Party Software Security - Episode 2 Featuring: Wendy Nather, Research Director

A Better Approach to Third-Party Software

A Better Approach to Third Party Software Security - Episode 1 Featuring: Jim Routh, CISO

Defending the Front Lines Securing Your Web App

Defending The Front Lines: Securing Your Web Applications

Stop Insecure Software at the Front Door

Stop Insecure Software at the Front Door

Forrester Survey Briefing Webinar Software Risk in Enterprises

Forrester Survey Briefing Webcast - Software Risk in Enterprises

Best Practices in Secure Coding for the SDLC

Best Practices in Secure Coding for the SDLC

The End of Application Development as you Know it

The End of Application Development As You Know It

Avoiding the SANS Top 25 Most Dangerous Programming Errors

Avoiding the SANS Top 25 Most Dangerous Programming Errors

Agile Overview

Agile Overview

State of Software Security

State of Software Security Volume 2

Building Blocks for PCI DSS

Building Blocks for PCI DSS 2.0

No More Excuses Eradicate Cross-Site Scripting Now

No More Excuses: Eradicate Cross-site Scripting Now.

State of Software Security

State of Software Security Volume 3 Webinar

Dirty Little Secrets Mobile Apps Invading Your Privacy

Dirty Little Secrets: Mobile Apps Invading Your Privacy

Owning Your Phone at Every Layer

Owning Your Phone at Every Layer

Application Security Fundamentals

The Top 5 Most Prevalent Web Application Vulnerabilities

Top 5 Most Prevalent Web Application Vulnerabilities

Penny Wise, Pound Foolish Avoiding Security Spend Pitfalls

Penny Wise, Pound Foolish-Avoiding Security Spend Pitfalls

State of Software Security

State of Software Security Volume 4 Part 1

State of Software Security

State of Software Security Volume 4 Part 2

How to Build an AppSec Training Program for Development Teams

How to Build an Application Security Training Program for Development Teams

Whats going Right With Your Secure Development Efforts

What's Going Right with your Secure Development Efforts?

Data Mining a Mountain of Zero Day Vulnerabilities

Data Mining a Mountain of Zero Day Vulnerabilities

The Vulnerability of Puiblicly Traded Companies

Disclosures 2012 - The Vulnerability of Publicly Traded Companies

Mid-Market Application Security Defend Like a Fortune 500

Mid-Market Application Security - Defend Like A Fortune 500 or Better

Thomson Reuters Hot to Implement an AppSec

Veracode and Thomson Reuters Discuss Web & Mobile Cyber Security Strategy

Broken Logic Avoiding the Test Site Fallacy

Broken Logic - Avoiding the Test Site Fallacy

Third-Party Application Analysis

Third-party Application Analysis - Best Practices and Lessons Learned

Mapping and Evolution of Android Permissions

Mapping and Evolution of Android Permissions

Web and Mobile Apps The Silent Assassins in your Cyber Security Strategy

Web & Mobile Apps - The Silent Assassins in your Cyber Security Strategy

Show me the Security Mitigating Risks with Vendor-Supplied Software

Show me the Security - Mitigating Risks with Vendor-Supplied Software

Crafting Super-Powered Rick Assessments

Crafting Super-Powered Risk Assessments

Power to The People Building Your Third-Party AppSec Program

Power to the People: Building Your Third-Party Application Security Program

Trust but VerAfy NSFOCUS on Why Software Providers Need Independet Security Attestation

Trust but VerAfy: NSFOCUS on Why Software Providers Need Independent Security Attestation

Don't Ask Don't Tell The Insecurity of Vendor-Supplied Software

Don't Ask, Don't Tell: The (In)Security of Vendor-Supplied Software

Budgeting for Defense

Budgeting for Defense

Mobile Security The Solution App Testing in a BYOD Federal

Mobile Security in a BYOD Federal World

Pages

 

 

contact menu