Tim Mackey, Principal Security Strategist, Synopsys & David London, Managing Director, Cybersecurity, The Chertoff Group
Most Executive Orders (EO) by a U.S. President are pretty straight forward, but not EO 14028. There are 74 directives contained within its 15 pages. While many of the President’s initiatives aim to promote greater awareness around operating software securely, others go further. The order also tackles security practices in the SDLC to address the risk profile. Combined these activities raise the bar for secure software development. One big question remains, how does all this impact you and your business?
In this webinar, The Chertoff Group’s David London and Synopsys’ Tim Mackey share their perspectives on this EO and how it impacts software producers and consumers. Specifically, they’ll discuss:
- How NIST and the NTIA have responded to the EO and how you can apply them in your organization
- What you can use to identify your organizations “critical software”
- Which deployment considerations you need to make for things like log management and zero trust principles
In this webinar, Synopsys, a leader in software security innovation, and the Chertoff Group, a premier security risk management firm, offers their shared perspectives on the Executive Order and the broad implications for both software producers and consumers. Learn about some of the more significant outputs from National Institute of Standards and Technology (NIST) and National Telecommunications and Information Administration (NTIA) in response to the Executive Order and how they can be directly applied to your development and deployment teams. This webinar focuses on ways to identify critical software, best practices for communicating security information between teams and organizations, and deployment considerations like log management and zero-trust principles.