Posted on
in Presentations
This session is aimed at those who want to see an Application Security tooling selection and procurement process from directive to implementation. We will walk through the different steps in selection, procurement, and implementation. Attendees will learn about various methods and strategies to ensure follow-through from the implementation of various security tooling in the SSDLC.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community