SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
THE MOST POWERFUL
APPLICATION SECURITY PLATFORM
ON THE PLANET
Speed your innovations to market – without sacrificing security.
C I S O EX E C U T I V E WO R K S H O P
Securing Beyond the Network:
Application Security for the Enterprise
Brought to you by
Saudi
April 23rd
2014 9 am - 4 pm Courtyard Marriott Riyadh Diplomatic Quarter
Saudi Green Method is specialized in Information Security and Business
Advisory Consulting Services. Saudi Green Method provides a wide range of
Consulting, Testing, Training Services in these domains and is a part of the
Green Method Group, with an extensive customer base in the Middle East.
The CISO Execu ve Workshop is an invita on-only event designed to educate
security decision makers on emerging threats and best prac ces to manage
applica on security risk posed by web,mobile and on-premise applica ons
developed by internal teams and third-party suppliers.
-
10:45
11:30
12:15
13:30
14:00
14:30 Break
Close
14:45
16:00
RSVP NOW!Demonstrations
The Veracode team will showcase its industry leading applica-
tion security platform for mobile, web, internally developed and
externally developed applications.
Ensuring Success in your Application Security Program
Expert advice on moving away from ad-hoc application security
testing towards a programmatic approach to guarantee success
Question and Answer Session
Securing the Extended Enterprise: Cloud, Mobile
& Supply Chain
How to retain control over security as data moves to the cloud
and reliance on third-party applications increases, plus security
consideration around BYOD and the rise of mobile applications
Approaches & Techniques for Application Security Testing:
Static Analysis, Dynamic Analysis and Manual Testing
Analysis of the most effective approaches for securing your
software with guidance on balancing expenditure in different
testing techniques to achieve the greatest return on investment
Lunch
Registration & Welcome Coffee
9:00
10:00
10:30
Cyber Security and the Application Layer
Discussion of cyber security trends, the increase in attacks on
the application layer and using your application security program
to supporting wider business objectives of growth & innovation
Application Security Fundamentals for the Enterprise
Explanation of critical security vulnerabilities in applications and
how they are being exploited by cyber - criminals in the wild
Break
8:30
Mission
AGENDA
Reserve your seat today at:
register@greenmethodonline.com or
Call Hamad Al Fataih at +966 59 782 2244

Mais conteúdo relacionado

Mais procurados

Application Security
Application Security Application Security
Application Security OAv3
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
 
7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web applicationTestingXperts
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Cloud Security Alliance Lviv Chapter
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017SMAU
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceZimperium
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationAboutSSL
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)TI Safe
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM Events
 
Ibm security domains 2015[3]
Ibm security domains 2015[3]Ibm security domains 2015[3]
Ibm security domains 2015[3]joenicod
 
Cybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEsCybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEsCyber Watching
 
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...CYFIRMA
 

Mais procurados (19)

Application Security
Application Security Application Security
Application Security
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017Alessandro Monforte Cisco - SMAU Napoli 2017
Alessandro Monforte Cisco - SMAU Napoli 2017
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
 
Ibm security domains 2015[3]
Ibm security domains 2015[3]Ibm security domains 2015[3]
Ibm security domains 2015[3]
 
Cybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEsCybersecurity - Needs and Barriers of SMEs
Cybersecurity - Needs and Barriers of SMEs
 
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
Cyfirma is launching its proprietary cyber intelligence analytics platform ca...
 

Destaque

Cartilha SPED da FIESP de maio 20112
Cartilha SPED da FIESP de  maio 20112Cartilha SPED da FIESP de  maio 20112
Cartilha SPED da FIESP de maio 20112Roberto Dias Duarte
 
Analytics Writetoreply.Org Digitalbritain 20090204 20090314 (Geo Map Report)
Analytics Writetoreply.Org Digitalbritain  20090204 20090314 (Geo Map Report)Analytics Writetoreply.Org Digitalbritain  20090204 20090314 (Geo Map Report)
Analytics Writetoreply.Org Digitalbritain 20090204 20090314 (Geo Map Report)WriteTo Reply
 

Destaque (6)

Cartilha SPED da FIESP de maio 20112
Cartilha SPED da FIESP de  maio 20112Cartilha SPED da FIESP de  maio 20112
Cartilha SPED da FIESP de maio 20112
 
Computadores
ComputadoresComputadores
Computadores
 
Frog
FrogFrog
Frog
 
Presentación1
Presentación1Presentación1
Presentación1
 
Analytics Writetoreply.Org Digitalbritain 20090204 20090314 (Geo Map Report)
Analytics Writetoreply.Org Digitalbritain  20090204 20090314 (Geo Map Report)Analytics Writetoreply.Org Digitalbritain  20090204 20090314 (Geo Map Report)
Analytics Writetoreply.Org Digitalbritain 20090204 20090314 (Geo Map Report)
 
Barokin affektit
Barokin affektitBarokin affektit
Barokin affektit
 

Semelhante a Secure your apps with the most powerful platform

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfSolviosTechnology
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Enterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media CenterEnterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media CenterMaria Willamowius
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of GlobalizationAujas Networks Pvt. Ltd.
 
Testing ADAS & Self Driving Cars
Testing ADAS & Self Driving CarsTesting ADAS & Self Driving Cars
Testing ADAS & Self Driving CarsAutomotive IQ
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek Mezack
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdfTechFai
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
Web Application Security.pptx
Web Application Security.pptxWeb Application Security.pptx
Web Application Security.pptxGenic Solutions
 

Semelhante a Secure your apps with the most powerful platform (20)

Ciso executive workshop
Ciso executive workshopCiso executive workshop
Ciso executive workshop
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Enterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media CenterEnterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media Center
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
Testing ADAS & Self Driving Cars
Testing ADAS & Self Driving CarsTesting ADAS & Self Driving Cars
Testing ADAS & Self Driving Cars
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
16231
1623116231
16231
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
Web Application Security.pptx
Web Application Security.pptxWeb Application Security.pptx
Web Application Security.pptx
 

Mais de Salil Kumar Subramony

Mais de Salil Kumar Subramony (6)

Veracode CISO Round Table
Veracode CISO Round TableVeracode CISO Round Table
Veracode CISO Round Table
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green Method
 
Appsec training gme
Appsec training  gmeAppsec training  gme
Appsec training gme
 
Appsec training gme
Appsec training  gmeAppsec training  gme
Appsec training gme
 
Appsec training gme
Appsec training  gmeAppsec training  gme
Appsec training gme
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 

Secure your apps with the most powerful platform

  • 1. THE MOST POWERFUL APPLICATION SECURITY PLATFORM ON THE PLANET Speed your innovations to market – without sacrificing security. C I S O EX E C U T I V E WO R K S H O P Securing Beyond the Network: Application Security for the Enterprise Brought to you by Saudi April 23rd 2014 9 am - 4 pm Courtyard Marriott Riyadh Diplomatic Quarter Saudi Green Method is specialized in Information Security and Business Advisory Consulting Services. Saudi Green Method provides a wide range of Consulting, Testing, Training Services in these domains and is a part of the Green Method Group, with an extensive customer base in the Middle East.
  • 2. The CISO Execu ve Workshop is an invita on-only event designed to educate security decision makers on emerging threats and best prac ces to manage applica on security risk posed by web,mobile and on-premise applica ons developed by internal teams and third-party suppliers. - 10:45 11:30 12:15 13:30 14:00 14:30 Break Close 14:45 16:00 RSVP NOW!Demonstrations The Veracode team will showcase its industry leading applica- tion security platform for mobile, web, internally developed and externally developed applications. Ensuring Success in your Application Security Program Expert advice on moving away from ad-hoc application security testing towards a programmatic approach to guarantee success Question and Answer Session Securing the Extended Enterprise: Cloud, Mobile & Supply Chain How to retain control over security as data moves to the cloud and reliance on third-party applications increases, plus security consideration around BYOD and the rise of mobile applications Approaches & Techniques for Application Security Testing: Static Analysis, Dynamic Analysis and Manual Testing Analysis of the most effective approaches for securing your software with guidance on balancing expenditure in different testing techniques to achieve the greatest return on investment Lunch Registration & Welcome Coffee 9:00 10:00 10:30 Cyber Security and the Application Layer Discussion of cyber security trends, the increase in attacks on the application layer and using your application security program to supporting wider business objectives of growth & innovation Application Security Fundamentals for the Enterprise Explanation of critical security vulnerabilities in applications and how they are being exploited by cyber - criminals in the wild Break 8:30 Mission AGENDA Reserve your seat today at: register@greenmethodonline.com or Call Hamad Al Fataih at +966 59 782 2244