Webinars

yahoo breach webinar resource

Yahoo! A Breach Too Far or the Reality of Consumer Privacy in 2016?

state of appsec resource

The State of Application Security Practice 2016

appsec bytes resource

AppSec Tutorial: Cross Site Scripting

beyond deployment resource

Beyond Deployment Velocity: How Technology and Process Increase the Likelihood of a Successful, Secure DevOps Initiative

security dev process resource

How to Make Security Part of Your Development Process

great debate

The Great Debate: The State of Application Security

How Do Vulnerabilities Get Into Software?

revealing truths myths and realities resource

Revealing the Truth Behind Software Security Myths and Realities

sc magazine webinar

Selecting an Application Security Testing Vendor

badlock what you need to know header

Badlock: What You Need to Know

sans getting started webinar resource

SANS Webinar: Getting Started with Web Application Security

metrics pyramid resources widget

Benchmarking AppSec: A Metrics Pyramid

how apps self protect resource widget

How Your Applications Can Protect Themselves from Cyberthreats

sans why need appsec program

SANS - Why You Need Application Security

Understanding and Responding to IT Security Vulnerabilities

Understanding and Responding to IT Security Vulnerabilities

Build Your Software Securely

Build Your Software Securely

XML Resource

Exploiting XML Entity Vulnerabilities - Black Hat Webcast Series

 Board’s Perspective on Cybersecurity

Understanding the Board’s Perspective on Cybersecurity

Mobile Applications Bridging the Gap Between Employee Productivity and Corporate Risk

Mobile Applications: Bridging the Gap Between Employee Productivity and Corporate Risk

Stagefright

SANS - What You Need To Know About Stagefright

The Fantastic Four: Metrics You Can’t Ignore When Reducing Application-Layer Risk

NYSE Survey Understanding Cybersecurity

NYSE Survey: Understanding Cybersecurity in the Boardroom

IoT is Daily Risk

Not In My Backyard: How the Internet of Things Introduces Risk to Daily Life

8 Practical AppSec Tips

8 Practical Tips to Link Risk and Security to Corporate Performance

The Internet of Things, the Software Supply Chain and Cybersecurity

Airwatch Are Your Employees Gambling

Are Your Employees Gambling With Corporate Data?

ISV Experience Graph

The ISV Experience: Security Gains, Cost Savings, and Business Benefits

Responsive AppSec

Responsive AppSec: Maintaining Development Agility With Application Security Testing

Application Security Training Beyond Compliance to Minimize Enterprise Risk

Application Security Training: Beyond Compliance to Minimize Enterprise Risk

Application Security Demonstrating True ROI

Application Security: Demonstrating True ROI

Secure Agile and DevOps

Secure Agile & DevOps: How It Gets Done

451 Research Report

Why Enterprises Are Finally Discussing the Elephant in the Room

Talking to the Board about Cybersecurity

A CISO’s Perspective on Talking to the Board About Cybersecurity

SANS 2015 Application Security Survey

SANS 2015 Application Security Survey, Part 2: Builder Issues

The Changinf ROle of the CISO

The Changing Role of the Chief Information Security Officer: What Every CISO Should Know

Cyberespionage

Cyberespionage: The New Paradigm

5 Steps for Preparing for a Vulnerability Disclosure

5 Steps for Preparing for a Vulnerability Disclosure

Get Inside the Minds of Cyber Gangs

Get Inside the Minds of Cyber Gangs

Why Developers Need to Thinks About Security

SC Magazine: Why Developers Need to Think About Security

Minimizing the Impact of s Breach

Minimizing the Impact of a Data Breach

7 habits

7 Habits of Successful Supply Chain Transformations

ghost-widget

SANS Webinar: Lessons Learned From The Ghost Vulnerability

Reality Checking Your Security Testing Program

Reality Checking Your Security Testing Program

Evolve to Become the 2018 CISO

Evolve to Become the 2018 CISO

Best Practices for Securing the App Layer

Best Practices for Securing the Application Layer Featuring Gartner

Secure Agile Dev Why Cant We All Get Along

Secure Agile Development: Why Can’t We All Get Along?

Is Dealing with Malware Like Finding Needles in you Enterprise Haystack

Is Dealing With Malware Like Finding Needles in Your Enterprise Haystack?

Shellshock What you need to Know

SANS Webinar: Shellshock - What You Need to Know

Strategies for Third-Party Software Security that Actually Work

451 Research Webinar: Strategies for Third-Party Software Security that Actually Work

Whats in Your Software

SANS Webinar: What's in Your Software? Reduce Risk From Third-Party and Open Source Components

Pages

 

 

contact menu