Software Security: The Call for Developer-Centric Threat Modeling
You've got the largest potential attack surface in history, and your business-critical applications represent both your greatest opportunities and greatest threats. Application security has never been more urgent.
But how are you currently addressing the need to accelerate application development/deployment with cybersecurity and compliance needs? What are you doing to release secure software faster? What are your current threat modeling practices, and how can they be enhanced?
Register for this executive roundtable, Software Security: The Call for Developer-Centric Threat Modeling, to gain new insights from thought leaders, as well as to discuss with your peers. Discussion points will be:
How are adversaries preying upon porous application security practices?
What can be done to speed up the release of secure software - without compromising security or compliance?
What is developer-centric threat modeling, and how can it enhance current application security practices?
Join ISMG's Tom Field for a moderated discussion that will feature insight and new threat research from Trevor Young at event sponsor Security Compass. This roundtable session will be: Chatham house rule, Peer driven, Pitch free