Hi [[ session.user.profile.firstName ]]

The Changing Role of the Chief Information Security Officer

In this special videocast sponsored by Veracode and moderated by Dark Reading, two of the IT security industry’s best-known voices – Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic – will discuss the changing role of the CISO and how the importance of that role is growing within the organization.
Recorded Aug 27 2015 6 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic
Presentation preview: The Changing Role of the Chief Information Security Officer

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Software Composition Analysis with CA Veracode May 10 2018 3:00 pm UTC 45 mins
    RJ Gazarek, CA Veracode Product Marketing and Chris Widstrom, CA Veracode Product Management
    In a DevOps world, companies must deliver product applications faster and cheaper. This has resulted in the increased use of open source components as building blocks- introducing additional levels of both security and business risk. Open source components can introduce vulnerabilities that can compromise the security of your applications – thereby impacting your ability to keep up with rapid delivery cycles and high quality standards.

    Watch this webinar to learn how you can ensure which open source components are in use in your organization in order to protect yourself from a large-scale data breach and to ensure uninterrupted business operations. Get a sneak peek at the latest Veracode has to offer with its Software Composition Analysis solution. Learn how your organization can get started creating a dynamic inventory of the components you are using, along with their versions and locations. Armed with this information, you will be on your way to securing your application portfolio and reducing overall business risk.
  • Pragmatic Security Patterns for Effective CI/CD Pipelines Apr 30 2018 10:00 am UTC 45 mins
    Paul Farrington - Director, EMEA & APAC Pre-Sales Consultants
    There's lots of discussion about shifting-left in relation to software development. DevSecOps is a term coined by analysts and security practitioners to encourage development teams to consider security as they embark on their journey. Shifting-left, can mean different things to different people. It's not even a new concept. Many, if not all developers today will write unit tests so that code can be flagged as incorrectly designed or defective, the moment it has been written. Iterative development means that we see potentially many mini 'V-models' repeated across the time window of development. Ideally as testing models improve, tests will be made, before software has been written.

    In this webinar we discuss potential options around how DevSecOps can live as part of a culture of wanting to shift-left, whilst at the same time being pragmatic about the bigger picture, high-velocity does not necessarily mean that every security test must take place at the speed of light. Some will agonise on whether a test should be allowed to break the build during CI, thus preventing automated delivery or deployment. If we can flag potentially vulnerable code, before the commit, we reduce the criticality of whether a build should proceed or fail - because the frequency of a security failure may be diminished by more hygienic coding practices. This is especially true of code that only survives in Production for short periods of time, again reducing the risk-window from a security escape.
    Join this webinar to learn
    The differences between using cloud vs on-premises software security
    How to increase speed of security without increasing false positive rates
  • Binary vs Source Code Scanning Apr 24 2018 3:30 pm UTC 30 mins
    Lupita Carabes, CA Veracode Solutions Architect
    The debate between binary versus source code scanning has been an active controversy within the static analysis space since its inception. While source code scanning analyzes un-compiled code, binary scanning analyzes compiled code. However, in the end, the result is the same. Despite this conclusion, this is still an area organizations are compelled to consider during their process of selecting application security solutions.

    Join this 20-minute webinar to find out how Veracode approaches this debate on static analysis! See how Veracode focuses not just finding errors, but also on ensuring organizations can fix vulnerabilities in the most efficient way possible. Learn how you can reduce total time to remediate vulnerabilities and how you can make bringing secure software to market fast a competitive advantage.
  • Reduce False Positives Through Data Flow Analysis Recorded: Apr 11 2018 12 mins
    Jacob Martel, CA Veracode Solutions Architect
    Why are false positives a costly headache for enterprises when testing for security flaws? The short answer is that they cause development teams to spend time - expensive time that they cannot afford to waste- trying to sort out which flaws they need to fix. False positives may create the image of a security flaw within an automated testing solution, but in actuality, it may not be. Therefore, the time spent trying to sort out the real flaws affects overall developer productivity – and more importantly your time to market.

    Watch this 20-minute webinar to learn how you can reduce false positives within your application security testing environment. Learn how the following considerations must be analyzed and assessed in order to save your development team’s time and productivity:
    •Flaws that have already been mitigated by the application design or the operating environment
    •Applications that already utilize custom validation routines, intrusion detection processes or restricted file access that mitigate the risk of a flaw
    •Initial findings through automated tests that incorrectly default to flaw status
  • How to Make Application Security a Competitive Advantage Recorded: Mar 28 2018 36 mins
    RJ Gazarek, CA Veracode Product Marketing and Asha May, CA Veracode Customer Engagement
    Awareness among IT organizations of application security continues to increase, as decision makers want assurance that the software they procure is secure. Very few IT leaders want their third-party applications to be the source of a cyberattack. In a recently published IDG study, 84% of surveyed IT Leaders agree that their companies are concerned about the potential data security risk posed by third-party applications. How can companies provide customers the assurance that they will protect their critical data and not risk exposure to a potential cyberattack?

    Join product and services experts from CA Veracode as they share insights from the IDG Survey and discuss the security concerns companies face when procuring software. They will also discuss Veracode’s latest approach in providing third party software assurance so that enterprises get peace of mind that their software supply chain remains secure.

    Learn how Veracode works with software providers to:
    •Meet the demands of customers looking for proof that your software is secure
    •Provide a path to maturing their AppSec program
    •Help defend their AppSec budget by showing the value and adoption it brings
    •Make their secure software a competitive advantage in a tightening market
  • Dynamic Scanning with CA Veracode Recorded: Mar 21 2018 19 mins
    Patrick Hayes, CA Veracode Solution Architect
    Test any web application with as little as a URL!

    Join this 20-minute webinar to see how Veracode can help you unlock the capabilities of DynamicDS and DynamicMP. With these deeper scanning abilities, your organization can identify and remediate application vulnerabilities and comply with several compliance standards, such as PCI and other financial industry regulations. See firsthand how Veracode’s dynamic scanning capabilities enable teams to:

    •Secure individual web apps during SDLC or while in production
    •Automate the overall dynamic scanning process to become an easy-to-use self-service offering
    •Improve quality through vulnerability verification and login configuration assistance
  • OWASP Top 10 2017: What You Need to Know Recorded: Mar 14 2018 62 mins
    Johannes Ullrich, Senior SANS Institute Expert and Chris Eng, VP Security Research, Veracode
    For the first time since 2013, the Open Web Application Security Project (OWASP) has updated its top 10 list of the most critical application security risks. According to OWASP, the 2017 OWASP Top 10 is a major update, with three new entries making the list, based on feedback from the AppSec community.

    During this webinar, Johannes Ullrich, Senior SANS Institute Expert and Chris Eng, VP Security Research at Veracode will explain more about the three new risks in the 2017 top 10, what else has changed since 2013, and provide resources to adopt best practices for preventing these risks.
  • Better Together: Static Analysis and Software Composition Analysis with Veracode Recorded: Mar 7 2018 16 mins
    Christian Dalomba, CA Veracode Solution Architect
    Open source components are a blessing and a curse. They help accelerate your application development at no cost- but put your organization at risk of getting breached and failing compliance audits. On average, 44% of applications contain critical vulnerabilities in open source components, so knowing which ones you are using is necessary to defend your organization against major vulnerabilities.

    Join this 20-minute webinar to see how Veracode Software Composition Analysis (SCA) works within the Veracode Platform to help you build an inventory of your open source components to identify vulnerabilities, covering open source and commercial code. Both solutions together can analyze both proprietary and open source code in a single scan, providing you visibility across your entire application landscape.
  • Panel: How Your Company Can Move From Understanding DevSecOps to Implementing It Recorded: Feb 28 2018 49 mins
    All our preceding sessions have described the key elements of a shift to DevSecOps. Now get practical tips, best practices and next steps on migrating to DevSecOps from our panel of experts. During this session, we will continue the conversation in an open discussion format and break for audience Q&A.

    Bring your questions and get ready to contribute your thoughts and ideas during this “ask the experts” session.
  • If Developers Own Security Testing in DevOps - What is Security's Role? Recorded: Feb 28 2018 42 mins
    Chris Wysopal, CTO at CA Veracode
    Application security is “shifting left.” As the responsibility for ensuring the stability and security of software shifts to developers, what does this mean for security professionals? What does their job look like if developers are responsible for security testing?

    •What the security professional’s role and responsibilities look like in a DevSecOps shop
    •The DevSecOps cultural changes that will affect security
    •The attributes that security tools will need in this new landscape
    •Best practices for security professionals looking to not only survive, but thrive, in a DevSecOps world
  • AppSec Policies in a DevOps World Recorded: Feb 28 2018 38 mins
    Pejman Pourmousa, VP of Program Management at CA Veracode
    Securing code during development increases speed to market and reduces cost – but developers can resist security testing if it’s disruptive to their workflow. That’s why planning your application security program with developer tools and processes in mind often means the difference between success and failure. This session will help you understand how, where, and when application security fits into a modern development organization.

    Key Takeaways:
    •Learn how to make security invisible, automate security checkpoints and integrate with popular tools like IDEs, ticketing, bug tracking, and build systems.
    •Scan as early as possible in the Software Lifecycle, as early as when code is written in an IDE.
    •How to proactively approach open source code your developers are using.
  • Integrating AppSec into Developer Tools and Processes Recorded: Feb 28 2018 47 mins
    Tim Jarrett, Senior Director of Enterprise Security Strategy at CA Veracode
    Securing code during development increases speed to market and reduces cost – but developers can resist security testing if it’s disruptive to their workflow. That’s why planning your application security program with developer tools and processes in mind often means the difference between success and failure. This session will help you understand how, where, and when application security fits into a modern development organization.

    Key Takeaways:
    •Learn how to make security invisible, automate security checkpoints and integrate with popular tools like IDEs, ticketing, bug tracking, and build systems.
    •Scan as early as possible in the Software Lifecycle, as early as when code is written in an IDE.
    •How to proactively approach open source code your developers are using.
  • The importance of Developer Training Recorded: Feb 28 2018 46 mins
    Maria Loughlin, Senior VP of Engineering at CA Veracode
    Most developers have little to no formal security training, in fact - less than one in four were required to take a single college course on security. But Veracode scan data shows that developer training can have a significant impact on code quality, with eLearning leading to a 19% improvement in fix rates and Remediation Coaching improving fix rates by 88%. In this session you’ll get actionable advice from our own VP of Engineering on how to boost your own developers’ secure coding skills.

    Key Takeaways:
    •Leadership plays a big role, align development goals with security to seed the change.
    •How to get Security and Development teams on the same page and make security review a foundational part of code review.
    •Tips for how to encourage your team to get continuous security education outside the office.
  • Creating Security Champions Recorded: Feb 28 2018 45 mins
    Sonali Shah, VP, Product Strategy at CA Veracode
    There just aren’t enough security experts to go around. But how do you support all of the development teams? What if I told you that through careful selection and good training it is possible to build your own army from the very people who own the development process? Attend this session to learn dos and don'ts from someone that has done it before. Free some of your own time while reducing risk.
  • DevSecOps Beyond the Myths: Cutting Through the Hype and Doubt to Get Results Recorded: Feb 28 2018 33 mins
    Sam King, General Manager at CA Veracode
    DevSecOps is moving beyond the buzzword stage and into the real world. But there are obstacles standing in the way of widespread adoption. Perhaps the biggest obstacle is a lack of understanding about what DevSecOps is, which can discourage IT leaders, developers, and security teams who fear that it is a bridge too far to cross from DevOps, let alone Waterfall and Agile methodologies. Despite these myths and doubts, DevSecOps is producing real results in organizations that embrace it. For example, CA Veracode’s analysis of thousands of application scans found that applications scanned for security flaws early in the development process had a 48% higher fix rate (reduction in flaws) than other applications.

    In this keynote address, CA Veracode General Manager Sam King will introduce the concepts of DevSecOps that will form the basis of this virtual summit. Sam will discuss:

    -A simple definition of what DevSecOps is, beyond the hype and the myths, and why it holds promise for bringing together the assurances of AppSec with the speed and agility of DevOps

    -Why the evidence says that DevSecOps is attainable in the real world – how CA Veracode scanning data shows that there is a genuine shift to DevOps and DevSecOps happening, one step at a time.

    -Overview of the challenges that stand in the way – cultural, process, and technological – and how best practices can break down barriers to change.

    -Welcome to speakers and setting the stage for what you should expect and come away with from the event.
  • What Do Microservices Mean for AppSec? Recorded: Feb 27 2018 33 mins
    Brian Pitta, Senior Solutions Architect, CA Veracode
    Microservices are a mainstay in the development of most modern applications as the shift to developing several small software components versus a single large application has been popular for a while. Yet even the best teams have trouble integrating security into their implementation. While many organizations see the benefits of the microservice architecture, questions continually arise on its impact on application security programs, especially with the rapid development that goes hand-in-hand with microservices.

    Join Brian Pitta, Senior Solutions Architect at CA Veracode who will discuss:

    •The need to keep up with the speed of DevSecOps and how to automate and integrate security testing with rapid feedback loops;
    •How to run and measure an effective AppSec program at scale and maintain a holistic view of all your applications given the shift to a more “decentralized” application environment to which the microservice architecture lends;
    •The importance of staying current with technology trends to equip an agile development team and continually enhance support for additional frameworks, languages and integration points
  • Understanding Application Vulnerabilities and How To Fight Them Recorded: Feb 21 2018 19 mins
    Robert Larkin, CA Veracode Solution Architect
    According to Gartner, the application layer contains 90% of all vulnerabilities. This is why you cannot let potential system flaws or weaknesses in your application be exploited to compromise the security of your organization’s most critical assets. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise.

    Join this 20-minute webinar to see how Veracode can help your security and development teams identify and remove the vulnerabilities and flaws that can put your organization at risk. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode provides on-demand application vulnerability testing to detect and offer solutions for vulnerabilities and other security issues.
  • Getting Started With AppSec Best Practices Recorded: Feb 7 2018 14 mins
    Nate Micalov, CA Veracode Soluation Architect
    Web applications are the number one attack vector for data breaches.

    Despite the proliferation of software vulnerabilities, the majority of organizations fail to adopt application security best practices for protecting software, data and users. The good news is that with the right tools, implementing application security best practices- such as testing, defining code standards, and creating standard policies- does not need to be at odds with the needs of your development team.

    Join this 20-minute webinar to see how Veracode can enable you to adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, hear our experts provide practical guidance starting with tips and tricks to integrating testing into the software development lifecycle all the way to scaling an application security program using our cloud-based platform.
  • Application Security Metrics: How To Track Success Recorded: Jan 31 2018 37 mins
    Anne Nielsen, Sr. Product Manager, Veracode Platform
    Metrics are critical for measuring and expanding an application security program. And there are a lot of important numbers you need to track to gauge your program’s progress, from fix rate to flaw density, but sometimes you need just one number that sums it all up. Executives don’t always want to see a slew of complicated charts and graphs – they want one simple number that answers, in a nutshell, is this program working, are we getting a return on our investment?

    Join us for a webinar with Anne Nielsen, Sr. Product Manager, Reporting & Strategy at Veracode, as we discuss our metric recommendation and dive into reporting best practices and tips for success.
  • Reduce Application Risk with Veracode Greenlight and Developer Sandbox Recorded: Jan 24 2018 16 mins
    Robert Larkin, CA Veracode Solution Architect
    During this 20-minute webinar, learn how developers can stay ahead of vulnerabilities that can disrupt the software development lifecycle (SDLC). See how Veracode Greenlight finds security defects and provides contextual remediation advice to help you fix issues in seconds, right within your IDE. Coupled with the use of Veracode’s developer sandbox, teams can scan code without alerting security or affecting an application’s overall compliance with policy.

    As a result you will be able to:
    •Reduce overall costs by 3x when compared to testing during the QA phase
    •Increase the fix rate of flaws using sandbox scans
    •Get your organization on track to move towards a DevOps and continuous release cycle
Cloud-Based Application Security
Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-attackers can find and exploit them, Veracode helps enterprises deliver innovation to market faster — without sacrificing security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Changing Role of the Chief Information Security Officer
  • Live at: Aug 27 2015 8:20 pm
  • Presented by: Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic
  • From:
Your email has been sent.
or close