Software Security: How to Prioritize, Measure and Convey It To the Board
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among the traditionally business-oriented members.

So, it’s important to prioritize software security and to tailor messages to the business functions so that they too can understand the organization’s risk posture. But communicating about software security to the board can be particularly challenging because of the ways that it differs from other security solutions. You don’t install a software security tool and count the breaches getting deflected; you change the way you develop software by building security in from the start. This is a significant pivot from traditional, reactive ways of thinking about security.

Security professionals are often faced with the following questions: How do we determine and justify the required resources for a software security program? How do we ensure – and prove – that development teams are adopting software security practices? Is our software security operating effectively? And how do we prove that?

Discussion topics will include:

  • How have you approached the software security challenge – and where is it among your strategic priorities?
  • How do you make the successful business case for a software security program?
  • With a program in place, how do you ensure your developers are following your standards?
  • How do you measure the success of your program?
  • How do you communicate the metrics to your board and senior management?


Join ISMG’s Jeremy Kirk for a moderated session featuring expert insight and case studies from Chris Wysopal, Founder and CTO at Veracode.
Chris Wysopal
Chris Wysopal
|
Founder and CTO
Jeremy Kirk
Jeremy Kirk
|
Executive Editor
Watch a brief video on the topic.
November 17, 2021 | 04:00 - 05:30 pm PST
 
By submitting this form you agree to our Privacy & GDPR Statement.
*Please note that this is an invitation-only event and space is limited.  All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.
Sponsored By
Veracode

Veracode is a leader in helping organizations secure the software that powers their world. Veracode’s SaaS platform and integrated solutions help security teams and software developers find and fix security-related defects at all points in the software development lifecycle, before they can be exploited by hackers. Our complete set of offerings help customers reduce the risk of data breaches, increase the speed of secure software delivery, meet compliance requirements and cost-effectively secure their software assets – whether that’s software they make, buy or sell. Veracode serves more than 2,000 customers across a wide range of industries, including nearly a third of the Fortune 100 and more than 20 of Forbes’ 100 Most Valuable Brands.

ISMG Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.

November 17, 2021 | 04:00 - 05:30 pm PST

Software Security: How to Prioritize, Measure and Convey It To the Board