stateofsecurity

What is the state of your software security?

on Sep 17, 15 • by Julia Smith • with No Comments

Two savvy technologists from Qualcomm, two renowned book authors, Polarion, Security Innovation, and Rogue Wave CTO, Rod Cope make for a educational, insightful afternoon. Join us...

Home » General Industry » What is the state of your software security?

Rogue Wave, Polarion Software, and Security Innovation are joining forces with software security experts James Ransome, Brook Schoenfield, Murali Somanchy, and Brian Rosenberg to host “Security at the source: Threat modeling and applied security architecture in Agile software development” September 29, 2015 at the Sheraton Palo Alto Hotel in Palo Alto, California.

This seminar will feature a keynote session from security experts:

• James Ransome, CISSP, CISM – Senior Director of Product Security in the Intel Security Group. He is a a Ponemon Institute Distinguished Fellow, and an author of 10 books including the most recent book titled “Core Software Security: Security at the Source.”

• Brook Schoenfield – Director of Product Security Architecture at Intel Security Group. He has been published by CRC Press, SANS, Cisco, and the IEEE. His 3rd book, Securing Systems, was Amazon’s number one bestselling new technology book at the end of May, 2015.

• Murali Somanchy – Product security engineer at Qualcomm. In his current role, he oversees the static analysis initiative which includes among other things defining the SA strategy, custom bug hunts, mentoring developers to write secure code and performing root cause on security & quality incidents. Previously, he has worked for over 10 years at Motorola where he was the technical lead for Static Analysis.

• Brian Rosenberg – Director of Security Engineering at Qualcomm. In his 10 years at Qualcomm, he has driven security improvements throughout the company’s portfolio of products and services at all stages of the development lifecycle. Before coming to Qualcomm, Brian spent over 15 years as a cryptologic mathematician at NSA, working primarily in information assurance.

The keynote presentation will be followed by a roundtable discussion comprised of industry’s leading software security experts, who will put you on the correct path to bulletproof software. The experts each represent a different segment of the development chain, so we’ll have an “end-to-end” discussion. In addition to pointing out vulnerabilities and ways around them, we’ll leave plenty of time to answer your most difficult questions.

This seminar will enable you to:

• Identify and remedy vulnerabilities early on in the software development life cycle
• Create policies for code management in integrated testing environments
• Ensure compliance to proven security standards by understanding what they mean
• Integrate security and compliance testing with Agile development

Two savvy technologists from Qualcomm, two renowned book authors, Polarion, Security Innovation, and our own CTO, Rod Cope make for a educational, insightful afternoon.

If you have a question about software security; if your organization is currently facing security challenges; then you’ve come to the right place, as we have the answers.

Register today.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top