Podcasts

  • Is a Secure Agile SDLC Programme a Possibility?

    October 24, 2013

    All organisations should incorporate security into their agile development processes; however best-practice models typically assume an idealistic model of how software is built. In this session, Chris Eng discusses how Veracode incorporated security into the agile development lifecycle for a product that involves anywhere from two to seven Scrum teams working in concert to ship monthly releases.

  • Playing the Game of Thrones: ensuring the CISO role at the King’s Table

    October 23, 2013

    For too long the CISO role has reported everywhere except to the board. This has resulted in conflicts of interest, poor security management and little enterprise level business risk intelligence. The enterprise should be reliant on this information in order to make better decisions in today’s business environment. How have we got here, and how do we take our rightful place at the King’s table?

  • The Era of Destructive Cyber Attacks - Are you prepared?

    October 22, 2013

    Learn about common mistakes that organisations make during cyber crises. In addition, find out why destructive attacks require special attention. We've lived it - you will learn.

  • Survival Isn’t Mandatory: Challenges and Opportunities of DevOps

    October 21, 2013

    Joshua Corman, Director of Security Intelligence, Akamai Technologies DevOps (development + operations) is a game changer and may be the end of security as we know it. The ludicrous velocity of change is far greater than bolt-on, post-deployment security measures can keep pace with. While DevOps terrifies security professionals, its pioneers are embracing security with open arms. Now is our…

RSA Conference Podcasts RSS

This document was retrieved from http://www.rsaconference.com/podcasts on Fri, 25 Apr 2014 01:04:51 -0400.
© 2014 EMC Corporation. All rights reserved.