Bruce Jenkins - Managing Consultant, HP Fortify
With most of an organization’s security spend allocated to perimeter defense, hackers have had to look for other ways in. The network is secure, so how else can they break into an enterprise to steal sensitive data? The answer—software. Vulnerabilities in software code are like big “welcome!” signs to cyber criminals, and fixing those vulnerabilities generally requires a committed investment in the people, the process and the technology necessary to secure both internally-developed and externally-acquired applications. Why and how should organizations like yours get started in addressing application security as a critical component of your security strategy? This session will share results from hundreds of application assessments across multiple industries and answer some critical questions related to evaluating risk and determining next steps that fit your organization’s needs.