Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Software Supply Chain: More Than Just an SBOM? Guest: Sandy Carielli, Forrester Research | David London, Chertoff Group | Tim Mackey, Synopsys | Patrick Carey, Synopsys Gone are the days when you only had to worry about the code your developers are writing. Now you have to think about a complex supply chain, which inc... August 23, 2022 8:00am Combating Advanced Supply Chain, Cloud and Identity-Based Attacks [EMEA] Jason Rivera, Senior Director - Strategic Threat Advisory Group As organizations have rapidly migrated to the cloud, adversaries have honed their craft to exploit the gaps that leave businesses vulnerable to cybera... August 25, 2022 9:00am How to Perform Effective Web Application Security Assessments Leanne Shapton - Portswigger, Joel Noguera - Hacker & Pentester, Cindy Ho - HackerOne Security reviews and assessments can take a lot of effort and still not provide the results you are looking for, especially in the face of ever-expand... August 23, 2022 4:00pm 2021 OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 2021 OWASP Top 10: Broken Access Control - 01 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disc... September 14, 2022 9:00am 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... October 12, 2022 9:00am 2021 OWASP Top 10: Cryptographic Failures - Ep 2 John Wagnon, Solutions Architect, F5 2021 OWASP Top 10: Cryptographic Failures - 02 Cryptographic failures, previously known as "Sensitive Data Exposure", lead to sensitive data exposur... September 21, 2022 9:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... 1 month ago | 11 mins Security Resilience in a Hybrid World Sean Earhard, Director of Sales Business Development, Cisco and Krystal James, Sales Business Development Manager, Cisco Security resilience is confronting a new world where everyone and everything is connecting. Businesses are operating as integrated ecosystems with bou... 2 months ago | 23 mins Cybersecurity for Edge AI & Edge AI for Cybersecurity: Synergies and Challenges Jérémie Farret, VP, Advanced Analytics & Artificial Intelligence, Inmind Technologies A deep transformation has been happening these past three years in every aspect of the modern workplace, with the widespread introduction of remote wo... August 19, 2022 5:00pm ソフトウェア開発者と利用者がサイバーリスクを可視化するためのソフトウェア・サプライチェーンのリスク管理を考える ソフトウェア協会理事・Software ISAC共同代表 萩原 健太 様、日本シノプシス合同会社 シニア プロダクト マーケティング マネージャ 松岡 正人 ソフトウェア開発者にとってソフトウェアの脆弱性を管理することは大きな課題です。十分なコストやリソースが割くことができない場合が少なくないからです。また、ソフトウェアの利用者にとって、利用するソフトウェアにどのような部品で構成されているのか、詳細に把握することや、それらのソフトウェアが内包するリスクを... August 23, 2022 7:00am Load more