NYSE Survey: Understanding Cybersecurity in the Boardroom
CISOs can become more effective, strategic leaders by understanding prevailing perceptions about cybersecurity before stepping foot into the boardroom. Listen to this webinar to gain strategic insights from NYSE’s survey of nearly 200 board members about how they perceive and prioritize cybersecurity. Chris Wysopal, Veracode co-founder, CTO and CISO, will also share his recommendations based on his own experience presenting to boards and his ongoing conversations with fellow CISOs.
RecordedAug 27 201556 mins
Your place is confirmed, we'll send you email reminders
Learn how Veracode Developer Training can help your development team code more securely!
Join this 20 minute webinar to get your application security program and secure DevOps initiatives off the ground with Veracode Developer Training. Learn how your developers can address important security concerns, such as:
•OWASP Top 10 and PCI requirements
•Secure coding for multiple languages (e.g., Java, .Net, CC++) and architectures (e.g., Mobile, Web and ClientServer)
•Proactive techniques, such as Threat Modeling and Secure Architecture that can be used in the early stages of the Software Development Life Cycle (SDLC), minimizing the number of security defects in the code
Colin Domoney, Consultant Solutions Architect - Veracode
As organisations use CI/CD pipelines to build, test and deploy software at ever increasing speed it becomes imperative that the software supply chain should be secured to prevent the deployment of code of unknown provenance or with known vulnerabilities. In this webinar we will examine this topic from the following perspectives:
1. Ensuring that a ‘chain of custody’ is maintained from source control through to deployed production code.
2. Understanding how software components and artefacts are introduced into the supply chain.
3. Best practices for controlling and assessing third party components in the supply chain.
See why Gartner has named Veracode a Leader in the Magic Quadrant for Application Security for the fourth time!
Join this 20 minute webinar to see how Veracode can help you manage security risk across your entire application portfolio through a wide range of security testing and threat mitigation techniques, all hosted on a central, cloud-based platform.
During this webinar, you will see a demo of the Veracode platform’s ability to scan all of the applications and components you build or buy, covering all major languages, frameworks, and application types. As a central repository for your applications and components, Veracode’s platform provides you with full visibility into your risk posture and integrates into each stage of your software development lifecycle, so you are building secure software.
It is challenging enough for organizations to stay ahead of the DevOps movement. As part of this trend, application security testing is becoming an integral part of a developer’s job. No longer can Static analysis alone ensure the overall security of an organization’s application portfolio.
In this webinar, learn how CA Veracode is taking the lead on securing DevOps with specific emphasis on:
•Validation of the impact of DevOps in the market through Veracode data and API usage analysis
•Vercode’s product portfolio strategy including Greenlight and IDE integrations enabling customers to stay ahead of DevOps
•Use case scenarios for customers to consider – each from the Security, Development and Operations perspectives
Looking for a consolidated solution to find, secure, and monitor all of your web applications?
Join this 20 minute webinar to see how Veracode can help you easily track and inventory all of your external web applications with the ability to scan and scale on thousands of sites in parallel to find critical vulnerabilities and prioritize your biggest risks.
Learn how to leverage technologies such as Veracode Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle (SDLC). As one of the multiple scanning technologies Veracode offers on a single platform, your organization can systematically reduce risk while continuously monitoring your security posture.
David Wayland, Head of Enterprise Application Security, Fortune 500 Financial Firm & Chris Wysopal, CTO & Co-Founder Veracode
Securing a global enterprise requires security, development, vulnerability management, compliance and risk professionals to understand the engagement and inflection points in the software development lifecycle—and their roles to accelerate it.
Join Veracode for a two part session featuring "Securing the Enterprise in a DevOps World" with David Wayland, and an interactive panel discussion to continue the conversation on securing the enterprise in a DevOps World. This open round table discussion will be led by Veracode Co-Founder and CTO, Chris Wysopal. We will have time for Q&A so bring your questions!
The discussion will touch upon:
· Are you crawling, walking or running with your DevOps initiative?
· Pitfalls? Success?
· How are you connecting the dots for the business and the board on how your application security initiative is mitigating risk?
Panelists: David Wayland, Head of Enterprise Application Security—Fortune 500 Financial Firm, Pete Chestna, Director of Developer Engagement—Veracode, Joseph Feiman Chief Innovation Officer—Veracode.
Pete Chestna, Director of Developer Engagement—Veracode
If you are moving between methodologies, you are probably looking for a roadmap or at least lessons from someone that’s been through it already. Over its 10+ years, Veracode has moved from monolith to microservice and from waterfall to DevOps. We have learned a lot along the way and I’m eager to share the story. In this session learn:
· A basic Understanding of Waterfall, Agile and DevOps from a people, process and technology point of view
· Considerations when transitioning between these methodologies
· An approach to leading the change in your own company
· How Security can best be integrated into DevOps
Colin Domoney, Consultant Solutions Architect—Veracode
According to Akamai, attacks at the application layer are growing by more than 25% annually. But many organizations still struggle to understand how to get started with application security, or what good looks like.
To shed light on the application security process, this session will outline the steps most of Veracode's customers take to develop a mature application security program. Attend and hear about Colin’s experience developing and managing an application security program from the ground up and learn:
• The different AppSec phases most organizations are currently in
• The next steps to take when moving toward a more comprehensive AppSec program
• Lessons learned, best practices and pitfalls to avoid -- from someone who’s been there
• What a comprehensive, mature AppSec program entails
Maria Loughlin, Senior VP of Engineering| Veracode
Software makes the world go round these days, and it’s also causing a lot of problems. The U.S. Department of Homeland Security recently found that 90 percent of security incidents result from exploits against defects in software. It sometimes seems like we’re just rolling out the red carpet for cyberattackers with our applications. Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software?
We’ll discuss the four primary ways that vulnerabilities end up in your software. Attendees at this session will understand the main sources of vulnerabilities and how to prevent them -- a good first step in making apps less like a red carpet for cyberattackers, and more like a moat. We’ll get attendees up to speed on the following:
• Insecure coding
• A threat landscape that never quits
• Indiscriminate use of components
• Programming language choice
Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point. Attend this session and learn about new approaches such as:
• Work with the way developers work.
• Cover not only the apps an organization develops internally, but also those it purchases or assembles from components.
• Move beyond the software development lifecycle to the full software lifecycle, covering apps from inception through production.
With the shift to DevOps, application security testing is becoming an integral part of the developer’s job. Successfully securing code in the development stage increases speed to market and reduces cost – but developers can resist security testing that’s disruptive to their workflow.
Join this 20 minute webinar to see how Veracode Greenlight finds security defects in your code and provides contextual remediation advice to help developers fix issues in seconds, right in the IDE. So you can release secure code at the speed of DevOps.
Most development organizations don’t have the time or the resources to create every application from scratch, so they rely on third-party software and integrate open source components into their internally developed software. However, securing open source components is challenging for many security professionals because they lack visibility into what components are in use where in their organizations.
At Veracode we know it can be difficult to pinpoint applications using vulnerable open source components. In this 30 minute webinar find out how Veracode Software Composition Analysis can help you:
•Assess proprietary and open source code in a single scan
•Build an inventory of your third-party components
•Gain visibility into which applications have a vulnerable version of a component
•Identify and remediate vulnerabilities to help comply with industry regulations
Colin Domoney, Consultant Solutions Architect - Veracode
Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software? We’ve found that there are four primary ways that vulnerabilities end up in your software. Understanding these sources and how to prevent them is a good first step in making your apps less like a red carpet for cyberattackers, and more like a moat.
Benefits of attending:
1.Learn how vulnerabilities are getting in your code and how to keep them out from a VP of Engineering
2.Gain actionable tips and advice on application security– from a development manager who lives it day to day
3.Move beyond the buzz about the insecurity of open source components – what is the solution?
4.Identify the best ways to help developers learn to code more securely
5.Gain insight from the latest research into which languages are introducing what vulnerabilities
Enable your developers to quickly identify and remediate security-related code defects throughout your SDLC without having to manage a tool. Veracode’s patented static analysis technology analyzes major frameworks and languages without requiring source code, so you can assess the code you write, buy or download, and measure progress in a single platform. Sign up for this 20 minute Static Analysis webinar to learn best practices for:
•Integrating static analysis into your development process
•Complying with internal and external security policies
•Creating policies for your application security program
•Evaluating code against policy before check-in
•Analyzing results and reporting capabilities (flaw viewer)
•Defining user roles and team views within the platform
Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community.
Join us for a webinar as we explore ways in which you can use integrations to help you go faster, without sacrificing security. Below are a few ways Veracode can integrate into your Agile and DevOps processes:
• Integrated Development Environments (IDEs)
• Build Servers
• Defect Tracking Systems
• Governance, Risk and Compliance Solutions
Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode
Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.
Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.
While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.
In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:
• The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention
• Practical steps both teams can take to transition to a secure DevOps environment
• Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle
Tim Jarrett, Sr. Director, Product Marketing & Tim Mathias, Cyber Security Executive
The New York State Department of Financial Services new Cybersecurity Regulations went into effect on March 1. These regulations, which cover financial services companies licensed by or operating in New York State, are more comprehensive and prescriptive than other cybersecurity regulations to date, and are most likely a taste of regulations to come. In particular, they introduce requirements around application security that are more specific and wide-ranging than most. What do financial services companies need to know about these regulations?
This webinar will get those affected by these requirements up to speed on:
> What the new regulations entail
> How best to approach these requirements
> How Veracode can help with compliance
Adrian Lane, CTO, Securosis, Jeff Craty, Dir. of Engineering, Veracode, & Tim Jarrett, Sr Dir. of Product Mktg at Veracode
DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.
This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.
Learn how you can have both development velocity and security without compromising either one.
Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-attackers can find and exploit them, Veracode helps enterprises deliver innovation to market faster — without sacrificing security.