Securing 100 Products - How Hard Can It Be?

Securing 100 Products - How Hard Can It Be? ( RSA Conference 2017 )

Many companies establish their Secure Development Lifecycle. The adoption of it crucial especially for corporations with dozens of applications. The main challenges they face are the diversity of architecture, dev languages, methodologies, compliance, regulations, etc. This talk will shed light on scaling up and out the application security capabilities and maximizing the software security maturity.

 

Detailed Presentation :

(Source : RSA USA 2017)

Speaker:

Nir Voltman (@ValtmaNir)

Nir Valtman heads the application security of the software solutions for NCR Corporation. Before the acquisition of Retalix by NCR, Valtman led the security of the R&D in the company. As part of his previous positions, he was working in several application security, penetration testing and systems infrastructure security positions. Valtman is a frequent speaker at leading conferences around the world, including Black Hat, Defcon, OWASP etc. Valtman has a bachelor of science in computer science but his knowledge is mainly based on cowboy learning and information sharing with the techno-oriented communities, such as blogging and releasing open-source tools (including AntiDef, Cloudefigo and SAPIA).

8669813678?profile=original

Pre Register For SACON -  India's First Security Architecture Conference

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.

>>Click Here To Pre Register & Avail Special Discounts

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)