Application Security Testing for an Agile & DevOps World

Presented by

Omer Winker, Principal, Products at Contrast Security

About this talk

Security teams have a hard time keeping pace with software development in Agile / DevOps environments, and the result of rapidly rolling out software is increased risk. With the majority of cybersecurity attacks focused on applications, automatically detecting vulnerabilities and protecting your applications from attack is critical to your business. It’s easy to get tangled into the numerous approaches and technologies in application security testing, let alone selecting one that’s right for Agile and DevOps. As a result, it becomes challenging to even start developing an application security testing strategy for your business. In this presentation, you will learn: - SAST, DAST And IAST approaches used in Application Security Testing - Strengths and weaknesses of each approach - Best practices in securing your software code - How to start developing a winning application security testing strategy Remember, applications are the primary target for cyber criminals, so don’t let your most prized customer and corporate assets be exposed to potential attacks!

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (25)
Subscribers (5086)
Contrast Security is the leader in next-generation application security, embedding code vulnerability analysis and attack prevention directly into software through instrumentation. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improving efficiencies and cost, and enabling rapid scale while protecting applications from known and unknown threats.