Register Now

     First Name:
     Last Name:
     Title:
     Company:
     Address:
     Dept/BOX/ MS:
     City:
     State/Prov:
     Zip/Postal Code:
     Country:
     Email:
     Phone: - -
     Fax: - -
     Company URL:

 
How many employees are in your entire organization?
 
Register Now
Featured Speakers:
 
  • Chris Wysopal,  Co-Founder, CTO & Chief Information Security Officer, Veracode
     
    Veracode Privacy Policy

    Bookmark and Share

     
     
    A Dark Reading Webcast:

    Disclosures 2012: The Vulnerability of Publicly Traded Companies


    Duration: 60 minutes

    The proliferation of cyber attacks that we have witnessed in the past year has sparked intense interest in the disclosure of cybersecurity risks by public companies. Public companies are subject to greater compliance requirements, generally have more funding, and were recently encouraged by the SEC to disclose material cybersecurity risks in their SEC filings. Join Veracode's CTO and Co-founder, Chris Wysopal, as he presents real-world analytics surveying public organizations in order to determine whether public companies' software security posture is different or even better than all companies in general.

    In the recently released Study of Software Related Cybersecurity Risks in Public Companies Veracode analyzed data from 126 public companies who analyzed applications on the Veracode platform during the last 18 months. In this presentation, Mr. Wysopal will report on the most prevalent vulnerability categories in public company software applications, security compliance against industry standards, and estimate the basic security knowledge of developers. Mr. Wysopal will also examine what public companies are doing to manage the risks inherited from commercial software, outsourced software and third-party frameworks and libraries that are the building blocks of internal software development.

    In this webinar you will learn:

    • What vulnerabilities commonly occur in software in the public companies and how they are linked to cybersecurity risks?
    • Why so many applications are vulnerable to industry standard lists of the most frequently exploited application vulnerabilities?
    • What factors influence key decisions and policies regarding application security in an organization?

     
     

    UBM Tech - 600 Community Drive, Manhasset, New York 11030 - Privacy Statement