Yan Huang, Coverity Product Manager; Sami Petaejaesoja, Defensics Product Manager; Mark Van Elderen, Moderator
Commissioned study conducted by Forrester Consulting on behalf of Synopsys. Join Yan Huang, Sr. Product Marketing Manager - Coverity, and Sami Pataejaesoja, Sr. Product Marketing Manager - Defensics, as they dive deeper into the "The Total Economic Impact of Synopsys Testing Tools: Coverity and Defensics," case study. In this webinar, learn how to use the Total Economic Impact (TEI) framework to assess the potential return on investment your organization can realize by deploying Coverity and Defensics. Watch this webinar to learn how to achieve: faster time to market, fewer post release business disruptions, and best practices from existing customers with years of experience using security testing tools.
Mike Ahmadi, Global Director, Critical Systems Security, Synopsys Software Integrity Group
Connectivity is making cybersecurity a must-have obligation from initial designs through end of life. Automakers and suppliers have several unique challenges as they attempt to provide connectivity in vehicles that have burgeoning amounts of software that must remain secure and efficient over long vehicle lifetimes. Throughout the industry, there is a race to leverage safeguards used in other industries in ways that meet automotive safety and reliability requirements.
During this one-hour webinar, industry experts will address design, development, and implementation of security-critical cyber-physical vehicle systems; implementation strategies, process, and lifecycle management; and cybersecurity assurance verification and validation practices being implemented by members of SAE working groups. A number of tools will be employed, many using over the air (OTA) updating to fix vulnerabilities and adapt to changing threats.
An audience Q&A will follow the technical presentations.
Chris Rommel (VDC Research); John Jacott (Synopsys Software Integrity Group)
As the automotive industry embraces software and connectivity to deliver innovative features and functionality, the code bases of in-vehicle systems have grown exponentially, sustained by increasingly complex software supply chains. The pace and magnitude of this change challenges the incumbent resources and processes that OEMs and their suppliers possess to test and harden these interconnected and often safety-critical systems. This paradigm, compounded by the evolving threat landscape and sophistication of cyber attackers, is elevating the level of risk associated with automotive software quality, security, and compliance. As demonstrated by recent vehicles hacks and the subsequent recalls and unwanted attention from regulators and mainstream media, insecure software poses a very real threat to the automotive industry.
Join Chris Rommel of VDC Research and John Jacott of Synopsys’ Software Integrity Group as they explore the mounting software challenges faced by OEMs and their suppliers. Learn how the automotive industry can adapt by leveraging existing solutions and best practices to drive down risk while maintaining agility and the innovative edge that modern technology affords.
Jon Jarboe (Senior Technical Marketing Manager, Synopsys)
There are plenty of good ideas for improving the testing process, but many teams struggle to put these ideas into practice. How can a QA team make the most of testing practices that span multiple teams and development phases, utilize different technologies, address different objectives and include automated and manual workflows?
Listen in to learn how Synopsys can help your team take practical steps to improve testing by:
-Enabling developers to improve code quality and security, early
-Prioritizing testing runs based on business risk and the impact of product changes
-Addressing important testing gaps while avoiding redundant testing
Modern software development practices dominated by component-based engineering and short development cycles have largely been a catalyst for rapid advancements in technology. These practices, however, have also resulted in an epidemic of known vulnerabilities baked into third-party software components of IoT applications and devices. These widespread security flaws, many of which are critical in nature, often remain unnoticed or unaddressed throughout the software or device lifecycle, posing significant risks to the people and organizations that rely on them.
As software continues to permeate the ever-expanding Internet of Things, software vulnerabilities represent a greater and greater threat. IoT devices, like traditional computers, run on software that is susceptible to malicious attacks. As more devices become connected, understanding how to identify and manage security vulnerabilities within widely used third-party software components is critical for all stakeholders, including manufacturers and end-users.
In this webinar, our diverse panel of security experts will:
•Propose an expanded definition and understanding of IoT and the stakeholders at risk
•Present research highlighting the pervasiveness of vulnerabilities in third-party software components of IoT devices
•Draw some conclusions about the state of software security in IoT today
•Discuss some simple approaches to addressing these problems
Mike Ahmadi (Critical System Security, Codenomicon); Billy Rios (Founder, Laconicly); Frank Gillett (Forrester)
In an age of connectivity, the ever-expanding Internet of Things has evolved to encompass control systems that govern physical processes such as food production, chemical production, energy production, defense systems, and safety systems. As with other IoT devices, remote connectivity enhances the functionality and efficiency of control systems, paving the way for new opportunities. However, the vast majority of control systems in use today were not designed with connectivity in mind and are vulnerable to malicious cyber attacks. As many of these systems are critical in nature, introducing them into a networked environment presents as many security challenges as it does advantages. Join Codenomicon and our esteemed guests for an engaging discussion about the business opportunities, challenges, and shifting approach to risk management posed by control systems in the Internet of Things.
Mike Ahmadi (Medical Device Security, Codenomicon); Debra Bruemmer (Security Analyst, Mayo Clinic); Skip Snow (Forrester)
The nearly blinding pace of technology growth in health care has led to networks of systems and devices that not only help support and maintain human lives, but have also taken on some of the characteristics of the biological systems they interact with. As the patient changes so do the medical devices connected to the patient, and so does the network connected to the medical devices. This interconnected system of man and technology has led to an environment where vulnerabilities in the technological systems can lead to dire consequences for the patient. Like the human systems technology must interact with, the technological systems need to be managed throughout their entire lifecycle, from inception to retirement. Please join this session for an overview of how vulnerabilities can be discovered, and what we need to do to continue managing vulnerabilities throughout the lifecycle of a healthcare system.
Transform application security testing with true software signoff
Synopsys, Inc. is the Silicon to Software partner for innovative companies developing products and software applications we all rely on. Synopsys has a long history of being a leader in electronic design automation and semiconductor IP, and is also a leader in software quality and security with its Coverity, Codenomicon, and Seeker solutions.