Hi [[ session.user.profile.firstName ]]

Reducing the Friction between Development and Security

Many people believe that development and security teams have competing priorities that often become the biggest barrier to the success of an application security program. Developers are usually resistant to their organization creating an AppSec program for fear of being slowed down in delivering their code. This negative mindset about security is often due to security professionals dictating rules, workflows and tools on developers instead of creating strong partnerships, common goals, and tools that seamlessly integrate with the development toolchain.

Join Micro Focus in this webinar to learn:

• Tips on creating partnerships with your devs
• Why developers are the key to your appsec program success
• Tools and Integrations vital to keeping developers engaged with security
• Use case of how one organization was able to reduce this friction
Recorded Mar 31 2020 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rick Dunnam, Orasi/Saltworks and Brent Jenkins, Eric Echols and Stan Wisseman, Micro Focus
Presentation preview: Reducing the Friction between Development and Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Synergies with SAST and DAST Sep 1 2020 3:00 pm UTC 60 mins
    Brent Jenkins, Rick Smith and James Rabon, Micro Focus
    Did you know that the combination of static (SAST) and dynamic (DAST) application security testing methodologies provides a more comprehensive view of an application’s risk posture? Static analysis tools give security teams thorough feedback early in the SDLC, while dynamic analysis tools provide a quick win by immediately discovering exploitable vulnerabilities in either production or pre-production environments. Testing in both ways yields the most complete view of the risk posed by weaknesses and vulnerabilities within the application.

    Join members of the Micro Focus Fortify team to discover five reasons why SAST + DAST is vital to a successful, comprehensive Application Security program.
  • Explore the Path to Universal Policy Management Aug 18 2020 3:00 pm UTC 60 mins
    Micro Focus
    Organizations must enforce security policies, configuration, and access controls consistently across their entire infrastructure, but the complexity and hybrid nature of today’s IT environments introduces new challenges. Brand new policy management solutions from Micro Focus can help.

    AD Bridge extends AD controls to Linux, UNIX, and cloud resources; Policy Compliance Assessor checks cloud readiness and migrates GPOs to Azure Intune, while Universal Policy Manager helps consolidate and simplify enterprise and cloud policy management.

    Attend this session to learn about these innovative and transformative solutions.
  • Extend the power of Active Directory to better manage and secure Linux resources Recorded: Aug 4 2020 51 mins
    Charles Davis, Full Armor Corp and Tim Sedlack, Micro Focus
    Would you like to eliminate manual, fragmented management processes and scripts by unifying how you manage authorization and authentication across your entire environment?

    Securing and maintaining a Day 1 desired state configuration of your Linux, UNIX, Mac and Non-domain joined Windows servers that are on-premise and in the cloud can be extremely challenging. Micro Focus AD Bridge is ‘Next Generation’ bridging. It natively joins a variety of resources to Active Directory so that they are managed just like your Windows servers without replicating users or requiring VPN. AD Bridge extends Group Policy with extensive settings (firewall, SSH, HTTP, FTP, IPTables, sudoers, services, config files, and more) so that your IT Managed Resources are configured, persisted, monitored and audited for compliance regardless of their location.

    This webinar will provide key information on AD Bridge and real life customer examples.
  • ArcSight 2020: The Evolution of the SOC Recorded: Jul 21 2020 63 mins
    Michael Mychalczuk, Dir. Product Mgmt, Security Operations and Eugenio Marrero, Sales Engineering Mgr, Micro Focus
    ArcSight turns 20 this year! The cybersecurity industry has experienced non-stop growth and change over the last two decades, and security solutions like ArcSight have continually worked to evolve and adapt to these changes.

    Join ArcSight Specialist Gene Marrero and ArcSight Commander Mike Mychalczuk as they discuss the journey of SIEM and what lies ahead for SOC teams as they strive to advance their threat detection and response capabilities. It’s an hour you don’t want to miss as we look back on 20 years in security, and unveil the latest and greatest of our upcoming ArcSight 2020 release.
  • Information Protection While Working From Home with Connected Recorded: Jul 15 2020 60 mins
    Ed Gavin, Product Manager, Micro Focus
    Remote work is increasing worldwide as a result of Covid-19. According to a recent survey of CFO’s by Gartner, 74% of respondents plan to shift more employees to remote work permanently. The shift to less secure and controlled home work environments puts more business critical information at risk of loss to ransomware attacks, insider threats, device loss or theft.

    Join Micro Focus to discuss these challenges and to learn how a policy based enterprise endpoint backup and recovery strategy can ensure that your organization’s valued information is always protected from data loss enabling you to embrace remote work with confidence.
  • Micro Focus Supervisor: An In-Depth Look at Solving Compliance Challenges Recorded: Jul 14 2020 61 mins
    Dennis Wild, Senior Product Manager - Supervisor and Howard Konopka, Business Consulting, eDiscovery, Micro Focus
    Organizations across a variety of verticals face increasingly complex regulatory environments. Bodies such as SEC, FINRA, and IIROC in addition to privacy regulations like CCPA and GDPR require strict supervisory retention and review plus precise processes to meet requirements. Many organizations leverage supervision technology to ensure compliance with internal requirements. This is complicated by exponential data variety, growth, and velocity.

    Attend this webinar and learn how you can scale to facilitate a comprehensive solution to align with your compliance processes and procedures.
  • The Artistry of Deleting Data Recorded: Jul 9 2020 24 mins
    David Gould, Senior Director, Secure Content Management Solutions, Micro Focus
    True artists understand the skill of editing their work—leaving only what is essential to convey their message. Data security experts must also know how to edit the exponential amount of data they collect. They must understand complex data privacy laws, know what data has privacy implications, and delete the data that isn’t needed in order to comply. This challenging new paradigm means organizations must rethink how to effectively manage their data through a defined lifecycle. Join our webinar to learn how Micro Focus solutions help ensure compliance, support legal requirements, and manage the lifecycle of your data from creation to deletion
  • Artfully Transforming Your Business and Managing Your Data Lifecycle Recorded: Jul 8 2020 21 mins
    Greg Clark, Director, Product Management, Micro Focus
    Artists take their creations through lifecycles to present important messages—even the selection of the final frame can make a difference. So, too, must organizations understand effective data management to maximize its business value, preserve data integrity, meet regulatory requirements, and reduce risk. This includes finding and analyzing key business and customer data and increasing the visibility into structured and unstructured data. Careful data lifecycle management is key to protecting your reputation, improving security, becoming more efficient, and maintaining regulatory compliance. Micro Focus solutions help customers around the world address data governance to enable greater speed, agility, and insight. Join this webinar to discover how we can help you achieve these benefits, too.
  • Reaching Zero Trust Access Control while Maintaining Low Friction Recorded: Jul 7 2020 60 mins
    Gireesh Kumar, Sr Product Manager, NetIQ Access Management & Stephan Jou, Interset CTO, Micro Focus
    As organizations elevate their security to Zero Trust level, maintaining or even improving the user’s experience remains paramount. Learn how the NetIQ Risk Service brings user and entity behavior analytics (UEBA) with out-of-the-box machine learning models. Using Micro Focus Interset powered machine learning, IT security teams now have access to personalized security to build individualized context. Organizations can use this level of personalized security to keep friction low for users accessing sensitive information while protecting themselves from malicious outsiders attempting to exploit it.

    The NetIQ Risk Service is the new central point of risk evaluation and scoring for the NetIQ product line.
  • Data Privacy & Protection: The Art of Protecting Data Recorded: Jul 2 2020 49 mins
    Ramses Gallego – International Director, Security, Risk & Governance – Micro Focus
    Periods of great change can produce great art. When looking at business, an increasing pressure around data (the amount collected, its security, and governance) is contributing to great business transformation. Data privacy and protection means you need new ways to control and secure customer data. And at the same time, you want to gain greater insight into your customers, ensure compliance, and enhance your overall productivity. Join us to find out how Micro Focus offers simplified, automated solutions that can provide security and governance over your identities, applications, and data—from creation to disposition and throughout the information lifecycle.
  • Mixing and Mastering the Art of Data Security Recorded: Jul 1 2020 17 mins
    Reiner Kappenberger, Product Management Director, Data Security, Micro Focus
    As a professional “security artist,” you understand the need to master the necessary tools, technologies, and processes to enable protection and usability for your data. You also know the importance of delivering efficient, consistent, and secure access to your most valuable corporate assets. As with any art form, the critical first steps are to choose a subject and composition—that is, to establish the framework and find a leading thread that ties the disparate elements into a consistent whole. While many security professionals start at the network and take a layered defense approach, those who are cybersecurity focused work in the opposite direction and start at the data layer. Join us for this webinar to learn how to close the gaps and unify your data security. You’ll discover how to encrypt data persistently wherever it is—in applications, databases, analytics, the cloud, and files on the network and endpoint—from creation to disposition and throughout the information lifecycle.
  • Defending against Insider Threats with Interset and CrowdStrike Recorded: Jun 29 2020 63 mins
    Stephan Jou, Interset CTO, Micro Focus and Shawn Wells, VP of Global Solution Architecture, CrowdStrike
    Insider threats are difficult to combat, and even harder to detect. Today, data breaches cost an average of USD $3.92 million, and roughly 1/3 of those breaches are due to insider threats. Whether out of negligence or malice, the bad actors within your organization are putting your data at risk. With billions of events, a plethora of entities, and vast attack vectors, organizations are now faced with a lack of visibility and control when it comes to insider threats, leaving them vulnerable to attacks.

    How can you best detect, react to, and mitigate insider threats in your organization? It comes down to leveraging the right endpoint data with unsupervised machine learning to find what may otherwise go unseen.

    Join industry and subject matter experts, Stephan Jou, Interset CTO and Shawn Wells, VP of Global Solution Architecture, CrowdStrike on June 29 to get an inside look at how you can defend against insider threats with Interset and CrowdStrike.
  • What’s New in Fortify 20.1 Recorded: Jun 16 2020 52 mins
    Brent Jenkins, Jimmy Rabon and Dylan Thomas, Micro Focus
    The Micro Focus Fortify 20.1 release, available now, provides a continued march towards the key strategic initiatives of the product suite with accelerated language support, providing end users with actionable results, continuing to expand our open source solution with Sonatype, hybrid delivery methods and shifting application security left. These initiatives and updates to the products support why Fortify was not only named a leader in the Gartner Magic Quadrant for Application Security Testing for the 7th consecutive year, but also named #1 for Enterprise organizations in Gartner’s Critical Capabilities report.

    In this webinar we will cover the newest and best features of Fortify Software Security Center, Fortify Static Code Analyzer, Fortify WebInspect, and Fortify WebInspect Enterprise. These added features, along with the current capabilities, prove why Micro Focus Fortify leads the market for Application Security.
  • Retain Archiving & Office 365: Ensure Your Data Archive is Complete & Compliant Recorded: Jun 9 2020 50 mins
    Stephen Cohen, Senior Systems Engineer, Micro Focus
    Microsoft Office 365 offers customers a wide range of products and services with one monthly subscription fee. However, their one size fits all approach to digital archiving and compliance might not be suitable for everyone.

    Join this webinar to learn:

    • How Micro Focus Retain Unified Archiving and eDiscovery can augment governance across all your digital communications
    • Provide coverage across more internal, mobile, and social communication platforms
    • Decrease costs and improve usability and performance for multiple user bases
  • Conquering the Authentication Challenge of Zero Trust Recorded: Jun 2 2020 61 mins
    Andras Cser, VP, Principal Analyst, Forrester, Kent Purdy, Product Marketing & Troy Drewry, Sr Product Mgr, Micro Focus
    As an organization's hybrid-cloud environment continues to expand far and wide beyond their control, the need for a zero-trust model is becoming mandatory. This higher level of digital security morphs identity verification from onetime event to a model where nothing consuming protected information is trusted by default.

    In this webinar, Andras Cser, VP, Principal Analyst with Forrester, and Kent Purdy and Troy Drewry of Micro Focus discuss how the zero-trust security model has forced a new paradigm onto authentication implementations as well as best-practices to secure all of your environment.
  • Mitigating Threats with Agility During COVID-19 Recorded: May 28 2020 29 mins
    Jeremy Lahners and Mario Daigle, Micro Focus
    Of course, criminals and other malicious actors are taking advantage of COVID-19. Of course. Anything is fair game to this crowd of bad actors. On top of dealing with unprecedented numbers working from home, Security Operations now must deal with the most unscrupulous group who are ramping up their attacks and targeting some of the most vulnerable amid the chaos.

    When a change of this magnitude happens, you hope you’re set up to adjust, and fast. If you don’t, either your workforce is caught flat-footed, or you’re vulnerable.

    These are both bad outcomes.

    That’s why speed and agility are not just for Olympians (who will sadly miss the 2020 games - here’s hoping it’s just a one-year delay!). If you have the right technology setup, where it requires minimal overhead and gives the most flexibility, you give yourself a fighting chance to adjust quickly and safely, keeping folks working remotely where possible, and minimizing business slowdown.

    Join Jeremy Lahners and Mario Daigle as they talk about the current Security Operations climate, new attack methods that are emerging, maybe do a little venting, and share ideas from successful customers that have managed to stay safe and productive.
  • Keys to Scaling an AppSec Program Recorded: May 12 2020 59 mins
    Jon Taylor, Frans van Buul, Michael Coleman and Harley Adams, Micro Focus Fortify
    Getting an Application Security program started takes a cultural shift, process changes, and a set of tools that don’t disrupt the speed and innovation of your software team. While many organizations have begun their AppSec journey, scaling those efforts from just a few applications to possibly thousands of applications per day come with a completely new set of challenges and issues. How can your organization make this transition from few to many with the current security resources, tools and expertise you have?

    Join Micro Focus Fortify in this webinar, “Keys to Scaling an AppSec Program” to learn:
    • The challenges in Scaling AppSec
    • Common mistakes made by organizations today
    • The keys to success in scaling
    • How Fortify assists organizations grow and mature their AppSec programs
  • Reduce the Risk AND the Friction Recorded: May 7 2020 37 mins
    Kent Purdy, Mario Daigle and Gireesh Kumar, Micro Focus
    As organizations elevate their security to Zero Trust level, maintaining or even improving the user’s experience remains paramount. Learn how Micro Focus uses advanced MI for behavioral analysis to protect against outsiders while keeping friction low when accessing sensitive information.

    In this webinar, Mario will cover advancements in machine learning while Gireesh will explain its applicability to access management.
  • Zero Trust Security…. The evolution of Trusted Identities Recorded: May 6 2020 62 mins
    Nick Nikols, Vice President, Strategy, Micro Focus
    Almost every security breach includes users as a target, source, or associated party. Organizations need to come to an understanding (quickly) that there cannot be, under any circumstances, an interruption or degradation of the user experience for internal users or customers. This is a critical element to the organization’s success. To do so, security teams will need to make security invisible and assume that everyone or every thing is not trusted until proven otherwise.

    As a result, Zero Trust security is the new benchmark that organizations are setting their sights on. However, depending on who is talking about it, there is a significant difference in what constitutes a Zero Trust architecture. In turn, this creates a level of confusion in the market. Zero Trust workforce initiatives need to begin by focusing on identity, access, and data.

    In this discussion, we will cover where Zero Trust is today and what we believe Zero Trust will become in the future—Adaptive Trust.
  • Managing Mobile Communications – Mobile Archiving Challenges and Solutions Recorded: May 5 2020 63 mins
    Stephen Cohen, Senior Systems Engineer, Micro Focus and Mark Carlin, Vice President of Sales, TeleMessage
    People today are more connected, some say over-connected, than ever before. We are empowered with myriad ways of communicating with business partners, friends, and family.

    Increasingly, legislative and regulatory changes require mobile device communications in the public and private sectors to be archived and produced upon request. Examples in the public sector include the Texas Public Information Act and Florida’s Government in the Sunshine law. The SEC and FINRA regulate mobile communications in the financial arena. Legal discovery obligations span public and private sectors.

    Government and private organizations need to keep pace. The question is: How?

    Join Stephen Cohen, Senior Systems Engineer at Micro Focus, and Mark Carlin, Vice President of Sales at TeleMessage, on Tuesday, May 5 at 10 a.m. PT and learn how to:

    • Take advantage of a vast set of intuitive and powerful archiving features
    • Gain better visibility across your organization’s digital communications
    • Improve early case assessment performance
Leading Security, Risk and Governance Platform
With the industry’s broadest set of integrated Security, Risk, and Governance solutions, combined with deep domain expertise and industry-leading analytics, Micro Focus is uniquely suited to help organizations take a holistic approach to protecting identities, apps, and data. Very few vendors can assure security and governance professionals that they are protecting against breaches, guarding the privacy of individuals and their data, and complying with regulatory and jurisdictional regulations – at scale, with ease, insight and confidence. Visit Micro Focus Security, Risk, & Governance at: https://www.microfocus.com/en-us/trend/security-risk-governance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Reducing the Friction between Development and Security
  • Live at: Mar 31 2020 3:00 pm
  • Presented by: Rick Dunnam, Orasi/Saltworks and Brent Jenkins, Eric Echols and Stan Wisseman, Micro Focus
  • From:
Your email has been sent.
or close