Hi [[ session.user.profile.firstName ]]

How Your Applications Can Protect Themselves from Cyber-Threats

Applications are a top attack vector for cyber criminals. That’s why application security is evolving to become an integral part of the software development and DevOps processes. But that’s not enough. To protect the enterprise, you also need to ensure the safety of applications that are already in production. As classic security defenses have failed to keep pace with the evolving threat landscape, your applications now need to protect themselves against real-time attacks. Join Dr. Joseph Feiman, Chief Innovation Officer at Veracode, and Sam King, Chief Strategy Office at Veracode as they explain how these trends will play out, and how you can build powerful and transformative self-protection into your applications as part of a more intrinsically secure DevOps and Security Operations process.
Recorded Apr 13 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Joseph Feiman, Chief Innovation Officer at Veracode, and Sam King, Chief Strategy Office at Veracode
Presentation preview: How Your Applications Can Protect Themselves from Cyber-Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security at Speed: Integrating AppSec into the Tools you Already Use Jun 21 2017 4:00 pm UTC 60 mins
    Tim Jarrett, Sr. Director, Product Marketing
    Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community.

    Join us for a webinar as we explore ways in which you can use integrations to help you go faster, without sacrificing security. Below are a few ways Veracode can integrate into your Agile and DevOps processes:

    •Integrated Development Environments (IDEs)
    •Build Servers
    •Defect Tracking Systems
    •Governance, Risk and Compliance Solutions
  • The Role of DevOps in Reducing the Likelihood of a Data Breach May 30 2017 3:00 pm UTC 60 mins
    Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode
    Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.

    Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.

    While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

    In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:

    • The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention

    • Practical steps both teams can take to transition to a secure DevOps environment

    • Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle
  • NY DFS Cyber Regulations: What You Need to Know Recorded: May 16 2017 56 mins
    Tim Jarrett, Sr. Director, Product Marketing & Tim Mathias, Cyber Security Executive
    The New York State Department of Financial Services new Cybersecurity Regulations went into effect on March 1. These regulations, which cover financial services companies licensed by or operating in New York State, are more comprehensive and prescriptive than other cybersecurity regulations to date, and are most likely a taste of regulations to come. In particular, they introduce requirements around application security that are more specific and wide-ranging than most. What do financial services companies need to know about these regulations?

    This webinar will get those affected by these requirements up to speed on:
    > What the new regulations entail
    > How best to approach these requirements
    > How Veracode can help with compliance
  • Beyond Deployment Velocity: How Technology & Process Increase DevOps Success Recorded: Apr 25 2017 61 mins
    Adrian Lane, CTO, Securosis, Jeff Craty, Dir. of Engineering, Veracode, & Tim Jarrett, Sr Dir. of Product Mktg at Veracode
    DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.

    This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.

    Learn how you can have both development velocity and security without compromising either one.
  • How to Apply DevOps in a Regulated Organisation Recorded: Apr 20 2017 36 mins
    Colin Domoney, Sr Product Innovations Manager
    With the mainstream adoption of DevOps, what does this mean for heavily regulated industries, such as financial services? How can an organisation that requires a clear segregation of duties between Dev and Ops, as well as strict regulations adopt the DevOps way?
    Join this webinar for an optimistic view of how Dev(Sec)Ops can be applied in such challenging environments as well as examples of industry best practices.
  • How to Get the Best Out Of DevSecOps - From the Ops Perspective Recorded: Mar 21 2017 43 mins
    Colin Domoney, Sr Product Innovations Manager at Veracode
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.

    Listen to this webinar to learn:

    - How security teams can work with their operations teams to ensure the best pro-active monitoring and logging of applications

    - How to ensure that governance structures allow rapid deployment

    - How to maintain security requirements so that security is an enabler for operations rather than an inhibitor
  • How to Get the Best Out Of DevSecOps - From The Security Perspective Recorded: Feb 21 2017 47 mins
    Colin Domoney, Sr Product Innovations Manager at Veracode
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.

    Join this webinar to understand from the security perspective both the challenges and benefits of a DevSecOps approach, and how to integrate with the rest of the developer and operations teams.
  • How to Get the Best Out Of DevSecOps - From A Developer's Perspective Recorded: Jan 26 2017 39 mins
    Colin Domoney, Sr Product Innovations Manager at Veracode
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.
    Join this webinar to understand from a Developer's perspective both the challenges and benefits of a DevSecOps approach, and how to integrate with the rest of the security and operations teams.
  • Application Security Within The Financial Market - An Interactive Case Study Recorded: Dec 8 2016 30 mins
    Arun Vohra, Services Manager
    With yet more cyber-attacks targeting the financial sector, it has never been more important to implement a robust application security programme within your cyber security strategy.

    Join our Live Interactive Case Study to learn how Veracode Customer Success Managers have Defined, Executed & Optimised successful AppSec programmes for our financial sector clients, and how you could use this within your organisation to help reduce the risk of a breach.”
  • What if your Web Applications could protect themselves? Recorded: Sep 28 2016 48 mins
    Dr. Joseph Feiman, Chief Innovation Officer at Veracode, and Joe Pelletier, Product Manager at Veracode
    To better protect against cyberattacks, it’s not enough to find and fix application vulnerabilities during development and testing. You also have to block malicious activity against applications already in production. Runtime Application Self-Protection, or RASP, is an emerging technology that helps detect and stop these common attacks in real time.

    Join this webcast to learn:

    • Emerging trends in web application security from our leading experts
    • Why detecting attacks from inside the application matters
    • How to integrate runtime protection in your development and DevOps processes
    • How Veracode Runtime Application Self-Protection can work for you
  • Why You Need Application Security Recorded: Jul 21 2016 39 mins
    Colin Domoney, Senior Product Innovation Manager
    With our increased reliance on software, faulty and insecure applications put your data and the data of your business partners at risk. This can have repercussions well beyond any one incident and application security is the only way to protect against the risk.
    Join Colin Domoney, previously Head of Appsec at Deutche Bank, as he discusses why applications are so risky, why you need to include application security in your security programme, as well as how he got started with Application Security.
  • Revealing the Truth Behind Software Security Myths and Realities Recorded: Jun 23 2016 37 mins
    Chris Campbell, Solutions Architect
    While web and mobile applications account for more than a third of data breaches (source: 2014 Verizon Data Breach Investigations Report), most organizations are not spending time or money on application security. So why the disconnect? One reason is that fallacies abound when it comes to application security. Many of these fallacies stem from the traditional, on-premises tools-based approach to application security, which has fostered the misconception that application security programs are expensive and difficult to manage. But as breaches continue to make headlines, organizations are realizing the serious risk posed by applications.
  • How do vulnerabilities get into software? Recorded: May 17 2016 44 mins
    Laurie Mercer, Solutions Architect, Veracode
    Research reveals that 63% of internally developed applications are initially out of compliance with OWASP Top 10 standards. Join this webinar to learn how vulnerabilities end up in your software.
  • Don't Just Find Software Flaws, Fix Them Recorded: Apr 19 2016 50 mins
    John Smith, Senior Security Architect, Veracode
    Reducing software risk is not just about finding vulnerabilities, it's about fixing them too. Join us to discover the different security testing technologies, and how each of them affect the areas of a business.
  • How Your Applications Can Protect Themselves from Cyber-Threats Recorded: Apr 13 2016 57 mins
    Dr. Joseph Feiman, Chief Innovation Officer at Veracode, and Sam King, Chief Strategy Office at Veracode
    Applications are a top attack vector for cyber criminals. That’s why application security is evolving to become an integral part of the software development and DevOps processes. But that’s not enough. To protect the enterprise, you also need to ensure the safety of applications that are already in production. As classic security defenses have failed to keep pace with the evolving threat landscape, your applications now need to protect themselves against real-time attacks. Join Dr. Joseph Feiman, Chief Innovation Officer at Veracode, and Sam King, Chief Strategy Office at Veracode as they explain how these trends will play out, and how you can build powerful and transformative self-protection into your applications as part of a more intrinsically secure DevOps and Security Operations process.
  • Why You Need Application Security Recorded: Feb 4 2016 61 mins
    Johannes B. Ullrich, Ph.D., dean of research at SANS and Joseph Feiman, CIO, Veracode
    Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Build Software Securely. What the data tells us Recorded: Oct 29 2015 62 mins
    Tim Jarrett, Director Product Marketing, Veracode and Adrian Lane, Analyst & CTO, Securois
    Tim Jarrett of Veracode and Adrian Lane of Securois discuss the software development landscape across different industry verticals. They offer best practices for measuring application portfolio risk, remediating software vulnerabilities, and motivating development teams to embed these concepts into the software development lifecycle.
  • The Fantastic Four: Metrics You Can’t Ignore When Reducing Application-Layer Ris Recorded: Sep 18 2015 62 mins
    Tim Mathias of Thomson Reuters, Mike Gleiter of Thomson Reuters and Tim Jarrett of Veracode
    You’re starting to get the hang of application security as an organization. But you have these nagging thoughts:
    Are my applications more or less secure than my peers’ apps? How can I convince my software suppliers to move faster? How can I demonstrate that our appsec program is making a difference?
  • Understanding the Board’s Perspective on Cybersecurity Recorded: Sep 3 2015 61 mins
    Andy Ellis, CSO of Akamai and Chris Wysopal, CTO & CISO of Veracode
    Following the onslaught of high-profile cyberattacks reported in the past twelve to eighteen months, cyber security has become a more frequent topic in board-level conversations. How should the CISO respond to these new challenges and pressures?
    Using data from an NYSE survey of nearly 200 corporate directors, two of the industry’s best-known voices – Andy Ellis, CSO of Akamai and Chris Wysopal, CTO & CISO of Veracode –discuss how CISOs can elevate the security conversation to a board-level discussion.
    Wysopal and Ellis also discuss key questions such as:
    •What are board members’ biggest fears regarding cyberattacks?
    •Who do board members hold accountable when a major breach does occur at your company?
    •How do board members prefer information be presented about risk posture and strategies?
    •What metrics are most effective for gaining buy-in for your risk reduction strategy?
  • The Changing Role of the Chief Information Security Officer Recorded: Aug 27 2015 6 mins
    Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic
    In this special videocast sponsored by Veracode and moderated by Dark Reading, two of the IT security industry’s best-known voices – Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic – will discuss the changing role of the CISO and how the importance of that role is growing within the organization.
Cloud-Based Application Security
Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-attackers can find and exploit them, Veracode helps enterprises deliver innovation to market faster — without sacrificing security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Your Applications Can Protect Themselves from Cyber-Threats
  • Live at: Apr 13 2016 4:00 pm
  • Presented by: Dr. Joseph Feiman, Chief Innovation Officer at Veracode, and Sam King, Chief Strategy Office at Veracode
  • From:
Your email has been sent.
or close