Hi [[ session.user.profile.firstName ]]

How Codenomicon Discovered Heartbleed Solutions For Protecting Your Organization

Presented by the experts with the facts.

The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
Recorded Apr 24 2014 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ari Takanen, Co-Founder, Chief Research Officer, Mikko, Varpiola, Co-Founder, Developer, Sami Petajasoja, Vice President APAC
Presentation preview: How Codenomicon Discovered Heartbleed Solutions For Protecting Your Organization

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • DevSecOps Best Practices with Synopsys and GitHub Apr 24 2018 5:00 pm UTC 60 mins
    Dave Meurer, Alliances Technical Mgr, Black Duck by Synopsys
    It's time to add “Sec” into DevOps! But while moving towards newer processes and technologies like agile methodologies, cloud and containers can help you build faster and deliver continuously, there's always the fear that adding security can severely slow things down. By using GitHub with Black Duck by Synopsys, you can automate your secure development workflows, shift security left, and avoid software rot.

    Whether you are an open source developer or enterprise software engineer, GitHub and Synopsys have solutions to help you put “Sec” into the center of DevOps without sacrificing speed and agility. In this live webinar, the experts from Synopsys and GitHub will demonstrate solutions for both open source and enterprise developers. Some highlights will include:

    - The real life of a vulnerability in 2017: Apache Struts
    - Black Duck CoPilot: It’s Free!
    - Black Duck your Pull Requests
  • Securing the Software Supply Chain – Binary Analysis and Open Source Security Apr 11 2018 5:00 pm UTC 60 mins
    Lisa Bryngelson, Sr. Product Manager, Black Duck by Synopsys
    Organizations of all kinds increasingly rely on third-party software from their supply chain partners and outsourcers to power the products and technology they deliver to the marketplace. Whether you’re an automotive company or a medical device manufacturer, use of third-party software libraries is now commonplace and essential to success in the competitive global marketplace.

    One of the biggest challenges companies face with third-party software is they often have no visibility into the open source libraries being used in the software they embed in their products. Over the last year, a continuous stream of news stories has attributed major security breaches to exploits of vulnerabilities in open source frameworks used by Fortune 100 companies in education, government, financial services, retail and media.

    These incidents shine a light on the need for organizations to carefully manage the open source used in the third-party libraries they consumer in order to protect themselves—and their customers—from the consequences of catastrophic security breaches.

    Our webinar will arm you with the information and statistics needed to:

    -Explain the importance of open source security to your organization
    -Understand the key differences between identifying open source in source code vs. binaries
    -Define a clear road map for unearthing, managing, and securing the open source hiding in your software supply chain
    -Take the steps to help your company avoid becoming the next security breach media story
  • Securing the Modern Automobile from Software Security Threats Mar 29 2018 5:00 pm UTC 60 mins
    Art Dahnert, Managing Consultant, Synopsys
    Today’s automobiles are advanced, complex machines relying on dozens of computers and millions of lines of software code. They are also increasingly targets for sophisticated hackers. In fact, the software running on your car could contain multiple flaws that allow an attacker to take over control of the vehicle – either in your driveway or on the freeway. What steps are manufacturers taking to secure all of that code?

    Register for our webinar to learn about these topics and more:
    - The kinds of security flaws that are possible and how were they're exploited
    - How vulnerabilities can be mitigated
    - Ways to build security in from the beginning of the software/system development process
    - Unique approaches manufacturers are taking to deal with some of these issues and what that means to you
  • DevOps Security in the Cloud with Black Duck by Synopsys and AWS Mar 28 2018 3:00 pm UTC 60 mins
    Erin McGill, Partner Solutions Architect, Amazon Web Services; Dave Meurer, Alliances Technical Mgr, Black Duck by Synopsys
    Automation and containerization can help you build faster and deliver continuously, but can also make managing security challenging. By integrating Black Duck Hub with the development tools you use in AWS, you can scan images in your container registry, automate build scans in your CI pipeline, and stay notified on any security vulnerabilities or policy violations found in your open source code.

    Join experts from Black Duck by Synopsys and Amazon Web Services as we explore how to build applications and containers safely in the cloud without sacrificing agility, visibility, or control. In this hands-on webinar we’ll demonstrate how to:

    -Get started with Black Duck Hub and AWS
    -Build better solutions through Open Source Intelligence
    -Use open source management automation and integration with AWS

    Plus, we'll feature a real-world example using Apache Struts, as well as the resources you can put to use today to gain the security you need without sacrificing the agility you want.
  • Application Security: What to Know for 2018 Mar 27 2018 3:00 pm UTC 60 mins
    Mike Pittenger, Security Strategist
    Application security is quickly becoming a "must have" for security teams. High profile breaches, including Equifax and a multitude of ransomware attacks, have the attention of senior management of company Boards. Knowing where to start can be difficult.

    Not every company has the same needs or organizational maturity to manage a full-blown application security program. This webinar will cover some of the tools and exercises deployed by application security teams to build security into their processes, including:

    - Tools and security tips for each phase of the development lifecycle
    - Which tools to use for different types of code
    - In-house and 3rd party options for starting an application security program
  • Open Source Projects That Break Boundaries Recorded: Mar 22 2018 60 mins
    Steven Zimmerman, Product Marketing Manager, Black Duck by Synopsys
    Over the last decade, Black Duck by Synopsys has recognized some of the most innovative and influential open source projects launched during the previous year, as recognition to the success and momentum of these projects, and affirmation of their prospects going forward.
    In this webinar, we'll explore the origins and evolution of this year's most outstanding Open Source Rookies, who are investing their efforts in everything from Autonomous Driving, through Scalable Blockchain, and VNF Orchestration, to Personal Security and Relationship Management.
  • Software Development with Open Source: Securing Applications and IP Recorded: Mar 21 2018 59 mins
    Tim Mackey, Sr. Technology Evangelist at Black Duck by Synopsys
    Open source software is embraced by developers, enterprises, and governments at every level, and with it comes many strong opinions and few facts. How much open source is really being used in the applications you buy? Does the "many eyes" theory make open source more secure? Does traditional security testing address vulnerabilities in open source?

    With organizations becoming more agile but facing increasing regulatory governance, understanding how open source software development works, and how to secure open source, is increasingly important. In this session we’ll cover:
    - Code contribution and IP management
    - Fork management
    - Release process
    - Security response processes
    - Realities of IP risk and open source
    - Pass through security risk and responsibility
    - Keeping up with scope of impact changes within a single disclosure
    - Automating awareness of security risk from development through integration and delivery to deployment
  • Breaking Down DevSecOps: Build AppSec Into Your CI/CD Pipeline with SAST and SCA Recorded: Mar 1 2018 60 mins
    Amy DeMartine, Forrester Principal Analyst and Patrick Carey, Synopsys
    While software grows more complex and the pace of development accelerates, the stakes for building secure software have never been higher. If you’re like most teams embracing a DevOps culture, you’re focused on breaking down silos, streamlining workflows, and cranking out functional software at a nearly continuous clip. Amid all these fundamental changes, how do you ensure your software is secure without clogging up the pipeline?

    Listen as guest Forrester Principal Analyst, Amy DeMartine and Black Duck Open Source Security Expert, Patrick Carey come together to discuss how to automate and distribute application security testing across the SDLC. In this webinar, we’ll discuss

    - Why it's important to build application security into your development and operations toolchains and processes
    - Best practices for integration application security throughout the application lifecycle
    - How to use SAST and SCA together to maximize the security of the software your teams deliver
  • Silver Bullet Podcast #143 with Elena Kvochko Recorded: Feb 26 2018 27 mins
    Gary McGraw
    Elena Kvochko is the CIO for the Group Security Function within a leading financial services organization. Previously she was an information technology manager at World Economic Forum, where she led global partnership programs on cyber resilience and the Internet of Things. She was also responsible for building relationships with information technology industry partners. Elena is the author of numerous articles and has contributed to Forbes, the New York Times, Harvard Business Review, and other media outlets. She is also a member of the Wall Street Journal CIO Network. She holds full CISSP and CEH certifications and has a master’s degree in technology policy from the University of Massachusetts, as well as executive certificates from MIT and Yale. She lives in New York City.

    Listen as Gary and Elena discuss security policy, security technology, the role of a CIO, holistic security tactics, the economics of a security breach, and more.
  • GDPR’s Influence on Security: Best Practices to Support GDPR Recorded: Feb 22 2018 63 mins
    Adam Brown, Manager, Security Solutions at Synopsys, Daniel Hedley, Partner at Irwin Mitchell LLP
    If your organisation competes in the global market, you should expect GDPR to have a critical influence on the software that powers your business. Having a disciplined software security approach will help you not only identify, remediate, and prevent weaknesses in your software but also avoid violating GDPR.

    Listen as experts Adam Brown of Synopsys and legal expert Dan Hedley of Irwin Mitchell, LLP provide insights into what GDPR requirements mean for your security initiative, how your existing security activities can support compliance, and best practices to keep in mind as you look to mature your software security program.

    About the Presenters:

    Adam Brown is Associate Managing Consultant at Synopsys in the software security consulting division. His background is in software security testing focusing on data centric web application security. Currently he specialises in helping organisations set up their software security initiatives, delivers training in software security and takes a keen interest in the GDPR from both data security and data privacy threat perspectives.

    Dan Hedley is a partner at UK law firm Irwin Mitchell LLP. He is a specialist IT lawyer, focusing in particular on software licensing and development, IT service contracts, outsourcing and cloud services. He also advises on open source compliance, data protection, software IP issues and the IT aspects of M&A and IPO transactions. He regularly acts for both established corporates and early-stage and fast growth businesses.”
  • *AST in CI/CD - How to Make it Work Recorded: Feb 13 2018 55 mins
    Ofer Maor
    SAST, IAST, DAST, MAST, *AST – There are plenty of technologies and ways to test your software, but how do we do that without slowing us down in a rapid development environment. In this talk we will give practical advice on how to integrate software security testing into your CI/CD and your development process so it works. The talk will review the pros and cons of each of the testing technologies, and how to adapt it to rapid development, and how to manage the balance between risk and speed to build a proper signoff process, so that real threats will become blockers, but other issues will be handled in a parallel slower cycle, without slowing down the main delivery.
  • Going Tribal With CISOs Recorded: Jan 31 2018 67 mins
    Gary McGraw, VP Security Technology, Synopsys Scott Crawford & Dan Kennedy, Research Director, 451 Research
    CISOs play an important role in our software-driven world, but what they do on a daily basis—and why—have largely remained a mystery—at least until we studied them in the wild and created the CISO Report.

    Join us as Gary McGraw, CISO Report author and VP of security technology at Synopsys, along with analysts Scott Crawford and Dan Kennedy from 451 Research discuss the evolving role of the CISO and what this novel study reveals:

    - What are the four newly identified CISO tribes, and which characteristics distinguish them?
    - How can knowing your tribe advance your organization’s security initiatives and spur career development?
    -Why does your CISO’s tribe reflect the priorities and dynamics within your organization?
  • Silver Bullet Podcast #142 with Craig Froelich Recorded: Jan 17 2018 31 mins
    Gary McGraw
    Craig Froelich is the chief information security officer (CISO) for Bank of America. He leads the Global Information Security team responsible for security strategy, policy, and programs. Before moving to Bank of America through acquisition, he was responsible for Countrywide’s cyber security technology, networks, crisis management, and security operations. Craig has over a decade of experience in product management and application development for software and hardware companies. He also serves on the board of FS-ISAC and the executive committee of BITS. On Twitter, he describes himself as “a SoCal dude learning to be a southern gentleman” as a Los Angeles transplant to Charlotte, North Carolina, where he lives with his family.

    Listen as Gary and Craig discuss the role of the CISO in the financial services ecosystem and the newly released 2018 CISO Report.
  • The 2017 Open Source Year in Review Recorded: Jan 17 2018 60 mins
    Mark Radcliffe, Partner, DLA Piper/Counsel OSI; Phil Odence, Sr. Director / GM at Black Duck Software by Synopsys
    Gain insights into these important legal developments from two of the leading open source legal experts, Mark Radcliffe, Partner at DLA Piper and General Counsel for the Open Source Initiative and Phil Odence, Sr. Director and General Manager at Black Duck Software by Synopsys. This annual review will highlight the most significant legal developments related to open source software in 2017, including:
    - Current litigation
    - An open source security update
    - Blockchain and its forks
    - Software Package Data Exchange (SPDX) and OpenChain
    - GDPR
    - And more
    Live attendees will be receiving a CLE credit for this webinar.
  • Silver Bullet Podcast #141 with Bruce Potter Recorded: Dec 28 2017 34 mins
    Gary McGraw
    Bruce Potter is CISO at Expel, where he is responsible for cyber risk and ensuring the secure operation of Expel’s services. Previously, Bruce co-founded Ponte Technologies (sold to KeyW Corporation). He then served as CTO at KeyW for 2 years. Before that, Bruce was a security consultant at Cigital. In a seemingly previous life, Bruce founded the Shmoo Group. To this day, he helps run the annual hacker conference ShmooCon. He has co-authored several books, including “802.11 Security,” “Aggressive Network Self-Defense,” and “Host Integrity Monitoring.” Bruce regularly speaks at DEF CON, Black Hat, and O’Reilly Security conferences. He lives in Maryland with his family.

    Listen as Gary and Bruce discuss ShmooCon, the state of software security books, network security trends, hacking back, the relationship between preventative security engineering and operational security, DevOps, the CISO role, and more.
  • 4 Steps to Risk Ranking Your Vulnerabilities Recorded: Dec 19 2017 29 mins
    Mike Pittenger, VP Security Strategy, Black Duck Software
    Vulnerabilities are an inevitable part of software development and management. Whether it’s open source or custom code, new vulnerabilities will be discovered as a code base ages. A 2017 Black Duck analysis of code audits conducted on 1,071 applications found that 97% contained open source, but 67% of the applications had open source vulnerabilities, half of which were categorized as severe. As the number of disclosures, patches, and updates grows, security professionals must decide which items are critical and must be addressed immediately and which items can be deferred.
    Join Black Duck’s VP of Security Strategy, Mike Pittenger, for a 30-minute discussion of best practices in open source security and vulnerability management. You’ll learn:
    - Methods for determining which applications are most attractive to attackers, and which pose the greatest risk
    - Ways to assess the risk associated with a disclosed open source vulnerability
    - Strategies to minimize the impact of open source security vulnerabilities when immediate fixes can’t be made
  • Black Duck Container Security MasterClass - Deploying Containers at Scale Recorded: Dec 14 2017 58 mins
    Tim Mackey, Sr. Technology Evangelist, Black Duck
    IT operations teams are now deploying and running hundreds or even thousands of containers at any given time. This rapid deployment surfaces challenges in validating the contents and security of container images being deployed. In this session, Black Duck container and virtualization expert Tim Mackey will provide an overview of technologies and solutions such as Red Hat OpenShift that enable organizations to deploy containers at scale securely.

    In this webinar, Tim Mackey explores this new era of large scale container deployments and how to manage and secure them.

    Attend and you'll learn:

    - How to maintain visibility and control for the open source deployed in hundreds of containers
    - How to help your development and operations teams work together to maintain the security of containers in production
    - How to build security into your deployment of container orchestration platforms
    - Measures you can take to proactively identify risks and remediate risks on containers in production
    - How you can use Black Duck OpsSight to scan containers being created, updated or deployed through their container orchestration platforms
  • Balancing Speed & Security in a DevOps World Recorded: Dec 12 2017 49 mins
    Stephen Elliott, Product Manager Google Container Registry and Dave Meurer, Director Technical Alliances
    DevOps teams are using cloud platforms and containers to build, deploy, and manage applications faster than ever, and utilizing large amounts of open-source software to increase agility. Google Cloud platform makes building and shipping containers even easier with Google Container Builder, Google Container Engine (GKE), and Google Container Registry (GCR). But when you deploy a container or cloud-native application, it’s hard to know exactly what contents are inside, and that can make managing security painful.
    Secure DevOps means having full visibility and control of your software supply chain to implement security and governance policies. How do you protect your DevOps without slowing down? Join experts from Google and Black Duck to discuss how to secure the software supply chain including:
    - Understanding the modern attack landscape
    - How to select safe and healthy open source software in development
    - How you can automate open source control and visibility in containers with Black Duck and both Google Container Builder and GCR
    - The Grafeas and Kritis projects, and the work Google and Black Duck are doing to enhance security visibility and provide policy enforcement for containers.
  • Buyer and Seller Perspectives on Open Source in Tech Contracts Recorded: Nov 30 2017 59 mins
    Phil Odence, Black Duck Software and David Tollen, Tech Contracts Academy
    Join Black Duck and Tech Contracts Academy as they discuss the implications of open source software in tech contracts. The topic of open source has been at the forefront of the technology industry for many years, but as the use of open source in commercial applications explodes, so do concerns about addressing license and ownership issues in contract negotiations.

    David Tollen is the founder of Tech Contracts Academy (www.TechContracts.com) and of Sycamore Legal P.C., in San Francisco. He’s the author of The Tech Contracts Handbook: Cloud Computing Agreements, Software Licenses, and Other IT Contracts for Lawyers and Businesspeople. He will dive into these topics from the perspective of both buyers and sellers and will aim to educate participants on Intellectual Property (IP) protection and other terms and how they should work during contract negotiations.
  • Lessons from Equifax: Open Source Security & Data Privacy Compliance Recorded: Nov 16 2017 46 mins
    Bob Canaway, CMO, Black Duck; Mike Pittenger, VP Security Strategy, Black Duck
    The Equifax breach provided a unique look into “how” many breaches occur. In Equifax’s case, hackers exploited an unpatched Apache Struts component, resulting in the exposure of over 140 million consumer records. The exploit of this vulnerability highlights the need for visibility to open source in custom applications and just how ineffective traditional security solutions are when it comes to open source vulnerabilities.
    Further, while class action lawsuits have already begun, Equifax faces other regulatory challenges as well. The US Federal Trade Commission started investigations into the company’s security policies and controls that will likely result in financial penalties. Since the exposed data included non-US citizens, foreign data protection and data privacy regulations also come into play.
    Join Mike Pittenger and Bob Canaway as they discuss how organizations can more effectively manage open source, the strengths and weaknesses of testing methodologies in identifying vulnerable open source components, and how data privacy standards such as PCI, Section 5 of the FTC Act, and GDPR necessitate a change in how organizations address vulnerabilities in their code.
Application security is a journey.
We go beyond traditional application testing to empower you to build security into your software at every stage of your development process. We offer application testing and remediation expertise, guidance for structuring a software security initiative, training, and professional services for a proactive approach to application security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Codenomicon Discovered Heartbleed Solutions For Protecting Your Organization
  • Live at: Apr 24 2014 4:00 pm
  • Presented by: Ari Takanen, Co-Founder, Chief Research Officer, Mikko, Varpiola, Co-Founder, Developer, Sami Petajasoja, Vice President APAC
  • From:
Your email has been sent.
or close