Hi [[ session.user.profile.firstName ]]

Synopsys - Software Integrity Group Webcasts

  • Date
  • Rating
  • Views
  • State of Software Composition 2017 - What's in your app?
    State of Software Composition 2017 - What's in your app? Robert Vamosi, CISSP and Security Strategist at Synopsys Recorded: Jul 12 2017 34 mins
    So much of the software today is created using third-party code, and why not? After all, it’s quicker and cheaper than building from scratch. Using third-party software, however, isn’t without challenges as the recent report The State of Software Composition Analysis 2017 reveals. In this webinar, the presenters will not only share highlights from this report, but they’ll also explore:

    •The use of trusted repositories for open source software, preferably from the source.
    •The use of SCA to monitor the ongoing state of software decay.
    •The need to update third-party software libraries as appropriate throughout the lifecycle.
  • Medical Device Security: An Industry Under Attack and Unprepared to Defend
    Medical Device Security: An Industry Under Attack and Unprepared to Defend Larry Ponemon, Chairman of Ponemon Institute & Mike Ahmadi, Director of Critical Systems Security of Synopsys Recorded: Jun 21 2017 49 mins
    A recent survey commissioned by Synopsys was designed to understand the risks to clinicians and patients due to insecure medical devices. The resulting report identified some expected findings, but others were extremely surprising. For instance, 67% of medical device manufacturers and 56% of healthcare delivery organizations believe an attack on a medical device built or in use by their organization is likely to occur over the next 12 months. Join Larry Ponemon of the Ponemon Institute and Mike Ahmadi of Synopsys as they discuss report highlights. They will also provide insight and predictions regarding the future of security in the medical device and healthcare industries.
  • Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
    Don’t WannaCry? Here’s How to Stop Those Ransomware Blues Steve Cohen, Product Marketing Manager, Synopsys & Robert Vamosi, CISSP and Security Strategist, Synopsys Recorded: Jun 14 2017 22 mins
    After taking the world by storm, it’s time to dig into the WannaCry ransomware worm to learn how a decades-old technique is still catching us off-guard. We’ll also examine how to safeguard your organization in the future against this type of attack.

    In this webinar, our experts will discuss the benefits of securing your organization's software to keep the bad actors from pivoting from vulnerabilities in the network layer to those in the application layer. We'll show you how to shrink the time to value in the market without compromising quality and security via a secure SDLC.
  • Software Security Strategy with BSIMM
    Software Security Strategy with BSIMM Sammy Migues, Principal Scientist Recorded: May 3 2017 54 mins
    If you play a role in your organization’s software security program, you know there is no shortage of things to do. In fact, the Building Security In Maturity Model (BSIMM) calls out the 113 most commonly observed software security activities. The BSIMM enables experts like you to discover what others are doing in this universe, how those activities currently work, how they worked in the past, and how they are likely to work in the future.

    However, implementing BSIMM activities like a checklist won’t get you to success. It takes some real strategy to efficiently include new software security activities and also ensure existing activities continue to be applied well.

    Listen as Sammy Migues, Principal Scientist at Synopsys, discusses how to marry BSIMM activities to a strategy enabling you to build a viable security program. Sammy bases his insights on over 300 in-depth assessments within the BSIMM and 30+ years of industry experience.
  • Moving Toward Better Security Testing of Software for Financial Services
    Moving Toward Better Security Testing of Software for Financial Services Steve Kosten, SANS instructor & Mike Ware, managing principal at Synopsys Software Integrity Group Recorded: Apr 20 2017 62 mins
    The financial services industry (FSI) maintains high-value assets and typically operates in a very complex environment. Applications of all types—web applications, mobile applications, internal web services and so forth—are being developed quickly in response to market pressures by developers with limited security training and with relatively immature processes to support secure application development. This combination presents a juicy target for attackers, and data shows that the FSI continues to be a top target. Attempts to introduce security into the application life cycle frequently face challenges such as a lack of available application security expertise, concerns about costs for tooling, and a fear among product owners that security processes might impede the development cycle and slow their response to market conditions.

    This webinar will explore:
    - Who is the financial services industry (FSI)?
    - Drivers of application security
    - Inhibitors of application security
    - The foundation of a secure SDLC
  • Forrester Total Economic Impact™ Study: Seeker® – IAST
    Forrester Total Economic Impact™ Study: Seeker® – IAST Liz Witherspoon, Forrester & Nadav Kotlarsky, Sr. Product Manager, Seeker Recorded: Mar 1 2017 52 mins
    Implementing Seeker, Interactive Application Security Testing by Synopsys, in your Agile development environment not only reduces time and cost to remediate security vulnerabilities, but also reduces risk of a data breach. To quantify these benefits, Synopsys commissioned Forrester Consulting to conduct an in-depth customer case study to examine the potential ROI an organization may realize from deploying Seeker.

    Join guest speaker Liz Witherspoon, Principal Consultant at Forrester Research, and Nadav Kotlarsky, Sr. Product Manager, as they explore an in-depth customer case study quantifying the potential ROI of deploying Seeker.
  • What's New in Coverity 8.7
    What's New in Coverity 8.7 Yan Huang, Sr. Product Manager, Coverity Recorded: Jan 25 2017 44 mins
    Synopsys, Inc. recently released Coverity 8.7, the latest version of the company's industry-leading static analysis tool and one of the core components of its Software Integrity Platform.

    This webinar presents several imporant updates to enhance its security analysis and extend its utility to a broader audience, including organizations developing web and mobile applications and software systems for vehicles and other safety-critical systems.

    Highlights:
    - Enhances Android security analysis to detect critical vulnerabilities and weaknesses on the OWASP Top 10
    - Improves security analysis and accuracy for JavaScript, Java and C# web applications
    - Expands desktop analysis with Integrated Development Environment (IDE) plugins for mobile and web application security testing
  • How to Deliver Robust and Secure Software
    How to Deliver Robust and Secure Software Jonathan Knudsen Recorded: Dec 13 2016 59 mins
    Software development is a mad rush to market where it seems like the only thing that matters is functionality. Everyone is just trying to make something that works and start selling it before anyone else.
     
    In the long game, security, robustness, and safety are crucial. Resilient, enduring software demands a proper secure development life cycle (SDLC) in order to locate and eliminate vulnerabilities during product development and after release.
     
    Automated tools are indispensable for locating vulnerabilities, and a signoff approach to the SDLC results in a final product, brought to market in a timely fashion, that presents a minimized risk to both producer and consumer.
     
    This presentation examines the classes of tools that locate vulnerabilities and shows how they are used in the context of product development to save time and money and minimize risk.
  • 5 Questions to Ask Your Software Provider About Cybersecurity
    5 Questions to Ask Your Software Provider About Cybersecurity Robert Vamosi, Security Strategist Recorded: Nov 11 2016 38 mins
    Congratulations! You’ve taken the first steps to get that great IoT idea of yours into production. You’ve even hired a team of engineers to build out your dream. But in the rush to market, security (and software security in particular) cannot be an afterthought with IoT. Unlike a server crash in an enterprise environment, failure of an IoT device or component can result in direct physical harm. Think of medical devices. Or connected cars. Or industrial control systems. So, are you doing all you can to make sure your software does not contain weaknesses and vulnerabilities that could bite you later on down the road? In this talk I'll discuss the need for software testing, early and often, both known and unknown vulnerabilities. Not only for the code you create in house, but also for the code you adopt from outside sources -- up to 90% can come from sources outside of your control. Topics covered include static analysis, fuzz testing, software composition analysis, interactive application security testing, and test optimization.
  • The Total Economic Impact Of Software Testing Tools: Coverity & Defensics
    The Total Economic Impact Of Software Testing Tools: Coverity & Defensics Yan Huang, Coverity Product Manager; Sami Petaejaesoja, Defensics Product Manager; Mark Van Elderen, Moderator Recorded: Oct 19 2016 48 mins
    Commissioned study conducted by Forrester Consulting on behalf of Synopsys. Join Yan Huang, Sr. Product Marketing Manager - Coverity, and Sami Pataejaesoja, Sr. Product Marketing Manager - Defensics, as they dive deeper into the "The Total Economic Impact of Synopsys Testing Tools: Coverity and Defensics," case study. In this webinar, learn how to use the Total Economic Impact (TEI) framework to assess the potential return on investment your organization can realize by deploying Coverity and Defensics. Watch this webinar to learn how to achieve: faster time to market, fewer post release business disruptions, and best practices from existing customers with years of experience using security testing tools.

Embed in website or blog