Discussion will start on web app threat model, sharing the effectiveness analysis of common app sec tools including SAST, DAST, IAST, RASP, WAF, bot detection, DB monitoring, open source scan and bin composition analysis. The discussion will cover the strategy to build cost-effective SDLC stack to minimize the appsec exposure and emerging risks from AI-assisted hacking tools with actionable recommendations.

Learning Objectives:
1: Learn about evolving app security tools and layered, effective use for best result.
2: Discover effective use of application security through automation and monitoring.
3: Learn how to reduce pen tests costs.


Speakers: Dr. Bill Chen, Gyan Prakash

Bill Yue Chen serves the role of Chief Security Architect at VISA leading enterprise initiatives across application security, data protection, cloud security, IAM and risk management. He has dedicated his whole career to cybersecurity since 1998. He defended his Ph.D. in secure software engineering at University of Southern California in 2007. Before joining VISA, he worked at Cisco, Microsoft and Infosec holding different technical and leadership roles. He has 10+ publications and patents in security. He has served as a program committee member for multiple international security conferences. He is also CISSP and a GIAC Certified Web Application Defender. He is very passionate about AI and robotics. In life, he is a proud daddy of twins Eva and Leo. He plays guitar and enjoys outdoors.

Gyan Prakash is a Sr. Director involve in Application Security at Visa Inc and brings 10+ years of application security experience, mobile security, data protection and blockchain with more than 150+ patents with 70+ patents granted.

Detailed Presentation:

(Source: RSA Conference USA 2018)
 
 
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)