Hi [[ session.user.profile.firstName ]]

Practical Steps to Improve Testing Agility

There are plenty of good ideas for improving the testing process, but many teams struggle to put these ideas into practice. How can a QA team make the most of testing practices that span multiple teams and development phases, utilize different technologies, address different objectives and include automated and manual workflows?

Listen in to learn how Synopsys can help your team take practical steps to improve testing by:
-Enabling developers to improve code quality and security, early
-Prioritizing testing runs based on business risk and the impact of product changes
-Addressing important testing gaps while avoiding redundant testing
Recorded Nov 18 2015 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jon Jarboe (Senior Technical Marketing Manager, Synopsys)
Presentation preview: Practical Steps to Improve Testing Agility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 5 Questions to Ask Your Software Provider About Cybersecurity Recorded: Nov 11 2016 38 mins
    Robert Vamosi, Security Strategist
    Congratulations! You’ve taken the first steps to get that great IoT idea of yours into production. You’ve even hired a team of engineers to build out your dream. But in the rush to market, security (and software security in particular) cannot be an afterthought with IoT. Unlike a server crash in an enterprise environment, failure of an IoT device or component can result in direct physical harm. Think of medical devices. Or connected cars. Or industrial control systems. So, are you doing all you can to make sure your software does not contain weaknesses and vulnerabilities that could bite you later on down the road? In this talk I'll discuss the need for software testing, early and often, both known and unknown vulnerabilities. Not only for the code you create in house, but also for the code you adopt from outside sources -- up to 90% can come from sources outside of your control. Topics covered include static analysis, fuzz testing, software composition analysis, interactive application security testing, and test optimization.
  • The Total Economic Impact Of Software Testing Tools: Coverity & Defensics Recorded: Oct 19 2016 48 mins
    Yan Huang, Coverity Product Manager; Sami Petaejaesoja, Defensics Product Manager; Mark Van Elderen, Moderator
    Commissioned study conducted by Forrester Consulting on behalf of Synopsys. Join Yan Huang, Sr. Product Marketing Manager - Coverity, and Sami Pataejaesoja, Sr. Product Marketing Manager - Defensics, as they dive deeper into the "The Total Economic Impact of Synopsys Testing Tools: Coverity and Defensics," case study. In this webinar, learn how to use the Total Economic Impact (TEI) framework to assess the potential return on investment your organization can realize by deploying Coverity and Defensics. Watch this webinar to learn how to achieve: faster time to market, fewer post release business disruptions, and best practices from existing customers with years of experience using security testing tools.
  • SAE Technical Webinar: Cybersecurity for the Life of the Car Recorded: Jul 14 2016 61 mins
    Mike Ahmadi, Global Director, Critical Systems Security, Synopsys Software Integrity Group
    Connectivity is making cybersecurity a must-have obligation from initial designs through end of life. Automakers and suppliers have several unique challenges as they attempt to provide connectivity in vehicles that have burgeoning amounts of software that must remain secure and efficient over long vehicle lifetimes. Throughout the industry, there is a race to leverage safeguards used in other industries in ways that meet automotive safety and reliability requirements.

    During this one-hour webinar, industry experts will address design, development, and implementation of security-critical cyber-physical vehicle systems; implementation strategies, process, and lifecycle management; and cybersecurity assurance verification and validation practices being implemented by members of SAE working groups. A number of tools will be employed, many using over the air (OTA) updating to fix vulnerabilities and adapt to changing threats.

    An audience Q&A will follow the technical presentations.
  • Connected Cars: Driving Change in Automotive Software Security Recorded: Apr 5 2016 64 mins
    Chris Rommel (VDC Research); John Jacott (Synopsys Software Integrity Group)
    As the automotive industry embraces software and connectivity to deliver innovative features and functionality, the code bases of in-vehicle systems have grown exponentially, sustained by increasingly complex software supply chains. The pace and magnitude of this change challenges the incumbent resources and processes that OEMs and their suppliers possess to test and harden these interconnected and often safety-critical systems. This paradigm, compounded by the evolving threat landscape and sophistication of cyber attackers, is elevating the level of risk associated with automotive software quality, security, and compliance. As demonstrated by recent vehicles hacks and the subsequent recalls and unwanted attention from regulators and mainstream media, insecure software poses a very real threat to the automotive industry.

    Join Chris Rommel of VDC Research and John Jacott of Synopsys’ Software Integrity Group as they explore the mounting software challenges faced by OEMs and their suppliers. Learn how the automotive industry can adapt by leveraging existing solutions and best practices to drive down risk while maintaining agility and the innovative edge that modern technology affords.
  • Practical Steps to Improve Testing Agility Recorded: Nov 18 2015 58 mins
    Jon Jarboe (Senior Technical Marketing Manager, Synopsys)
    There are plenty of good ideas for improving the testing process, but many teams struggle to put these ideas into practice. How can a QA team make the most of testing practices that span multiple teams and development phases, utilize different technologies, address different objectives and include automated and manual workflows?

    Listen in to learn how Synopsys can help your team take practical steps to improve testing by:
    -Enabling developers to improve code quality and security, early
    -Prioritizing testing runs based on business risk and the impact of product changes
    -Addressing important testing gaps while avoiding redundant testing
  • Managing Security in IoT: Vulnerabilities in the Cyber Supply Chain Recorded: Mar 24 2015 61 mins
    Mikko Varpiola (Co-Founder, Codenomicon), Tyler Shields (Sr Analyst, Forrester), Todd Carpenter (Chief Engineer, Adventium)
    Modern software development practices dominated by component-based engineering and short development cycles have largely been a catalyst for rapid advancements in technology. These practices, however, have also resulted in an epidemic of known vulnerabilities baked into third-party software components of IoT applications and devices. These widespread security flaws, many of which are critical in nature, often remain unnoticed or unaddressed throughout the software or device lifecycle, posing significant risks to the people and organizations that rely on them.

    As software continues to permeate the ever-expanding Internet of Things, software vulnerabilities represent a greater and greater threat. IoT devices, like traditional computers, run on software that is susceptible to malicious attacks. As more devices become connected, understanding how to identify and manage security vulnerabilities within widely used third-party software components is critical for all stakeholders, including manufacturers and end-users.

    In this webinar, our diverse panel of security experts will:
    •Propose an expanded definition and understanding of IoT and the stakeholders at risk
    •Present research highlighting the pervasiveness of vulnerabilities in third-party software components of IoT devices
    •Draw some conclusions about the state of software security in IoT today
    •Discuss some simple approaches to addressing these problems
  • Control Systems & IoT: Business Opportunities and Cybersecurity Challenges Recorded: Jan 22 2015 63 mins
    Mike Ahmadi (Critical System Security, Codenomicon); Billy Rios (Founder, Laconicly); Frank Gillett (Forrester)
    In an age of connectivity, the ever-expanding Internet of Things has evolved to encompass control systems that govern physical processes such as food production, chemical production, energy production, defense systems, and safety systems. As with other IoT devices, remote connectivity enhances the functionality and efficiency of control systems, paving the way for new opportunities. However, the vast majority of control systems in use today were not designed with connectivity in mind and are vulnerable to malicious cyber attacks. As many of these systems are critical in nature, introducing them into a networked environment presents as many security challenges as it does advantages. Join Codenomicon and our esteemed guests for an engaging discussion about the business opportunities, challenges, and shifting approach to risk management posed by control systems in the Internet of Things.
  • Identifying and Managing Vulnerabilities in Health Care Recorded: Nov 13 2014 64 mins
    Mike Ahmadi (Medical Device Security, Codenomicon); Debra Bruemmer (Security Analyst, Mayo Clinic); Skip Snow (Forrester)
    The nearly blinding pace of technology growth in health care has led to networks of systems and devices that not only help support and maintain human lives, but have also taken on some of the characteristics of the biological systems they interact with. As the patient changes so do the medical devices connected to the patient, and so does the network connected to the medical devices. This interconnected system of man and technology has led to an environment where vulnerabilities in the technological systems can lead to dire consequences for the patient. Like the human systems technology must interact with, the technological systems need to be managed throughout their entire lifecycle, from inception to retirement. Please join this session for an overview of how vulnerabilities can be discovered, and what we need to do to continue managing vulnerabilities throughout the lifecycle of a healthcare system.
  • How Codenomicon Discovered Heartbleed Solutions For Protecting Your Organization Recorded: Apr 24 2014 64 mins
    Ari Takanen, Co-Founder, Chief Research Officer, Mikko, Varpiola, Co-Founder, Developer, Sami Petajasoja, Vice President APAC
    Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
Transform application security testing with true software signoff
Synopsys, Inc. is the Silicon to Software partner for innovative companies developing products and software applications we all rely on. Synopsys has a long history of being a leader in electronic design automation and semiconductor IP, and is also a leader in software quality and security with its Coverity, Codenomicon, and Seeker solutions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Practical Steps to Improve Testing Agility
  • Live at: Nov 18 2015 7:00 pm
  • Presented by: Jon Jarboe (Senior Technical Marketing Manager, Synopsys)
  • From:
Your email has been sent.
or close