Building Security from Within: Empowering Software Teams for Cyber Resilience

Presented by

Ed Adams, CEO, Security Innovation

About this talk

Software continues to run the modern enterprise, and while it has the potential to drive innovation it can also introduce vulnerability. Rapid release cycles often prioritize features over security and hackers are adapting their tactics to target distributed software applications that are increasingly accessible. Security teams can’t single-handedly address this dynamic threatscape, so organizations must rethink how to strengthen security resiliency. Software teams are on the front lines in preventing vulnerabilities, but to build resilient applications they need to be equipped with security awareness and intimate knowledge of architecture, integration points, and deployment environments. Topics covered include: - Root causes of prominent software-borne breaches - Taking inventory of teams (and going beyond developers) - Building essential awareness - security principles, attack vectors, and threats - Being early to the (3rd) party – mitigating API, open-source, and cloud risk
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (70)
Subscribers (14850)
Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. We have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms. Our unrivaled proficiency in technical analysis, coupled with sound knowledge of business processes, results in world-class solutions that bridge the gap between application security holes and risk management optimization.