We're Starting a Conversation on Application Security Intelligence

We talk a lot on these pages about the sheer difficulty, and often apparent impossibility, of solving the problem of securing applications and the software that runs them. We evangelize the right approaches, instill the best methodologies and train people on the appropriate technologies to give us the best chance of securing our applications, yet we all know how often we collectively fail. In other words, we have to be right all the time, but the bad guys only have to be lucky once, as they say. As a result, we’ve begun to focus more on how to manage application security risk in context with the business through a concept known as application security intelligence, rather than spending inflinitely to blindly try to find and remediate every last vulnerability.

 

We’ve invited the brightest minds in application security to offer their thoughts on application security intelligence and its value in managing the threats that we face today. Join us for this Application Security Intelligence web summit on May 19th that includes the following presentations:

  • "Application Security Intelligence: Managing Application Risk" – Roger Thornton, CTO & Founder, Fortify Software, an HP company
  • "Optimizing Security in Software Development: Secure at the Source" – Derek Brink, VP & Research Fellow, Aberdeen Group
  • "Application Security Strategy in a Mobile World" – John South, CISO, Heartland Payment Systems
  • "Cloud Security and Its Impact on Application Security – Dennis Hurst, Founding Member, Cloud Security Alliance
  • "Addressing the Top 5 Web Application Security Threats – Dave Wichers, OWASP Board Member & COO, Aspect Security

View the full lineup and sign up to attend any or all presentations here. Please join us in the conversation about this new approach to treating risk in our applications.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.