ISMG’s Virtual Roundtables focus on specific challenges being faced by information security executives in today’s cybersecurity landscape. Moderated by one of ISMG’s Executive Editors and a guest industry expert, Virtual Roundtables give cybersecurity professionals the opportunity to discuss threats and controls with a handful of market leaders in an informal and online setting, from which you will emerge with new ideas and solutions you can immediately put to work to improve your own organization’s defensive posture.
Managing Fast and Secure Software Development
Nick Holland – Executive Editor, ISMG / Rohit Sethi – CEO, Security Compass
Software development processes have traditionally been binary – fast and risky or slow and safe. Neither is optimal.
Fast and risky means critical time to market needs are met, but at the potential cost of both financial and reputational damage. Slow and secure ensures product integrity, but risks faster and more agile competitors beating you to the finish line. However, fast and secure are not mutually exclusive.
What are the keys to Balanced Development Automation? How can proactive processes such as threat modeling and risk assessments meet with reactive processes such as compliance audits and penetration testing? And how can you transition your software development teams to this fusion of the best of both worlds?
Please join ISMG’s Nick Holland for an exclusive Virtual Roundtable that will draw from the experiences of the attendees, offering thoughts on the future of software development.
Discussion topics will include:
- Where am I today – fast and risky or slow and safe?
- What would be optimal for my specific business?
- How can I overlay Balanced Development Automation on my existing systems and procedures?
Joining Nick to provide expert insight and case studies is Rohit Sethi, the CEO of Security Compass.
Date: Tuesday, September 15th, 2020
Time: 4:00 PM – 5:30 PM ET
Moderator: Nick Holland
About the Sponsor
At Security Compass, we have extensive cross industry knowledge, technical prowess, and have developed the right expert tools to prevent a security breach.
We guide your team in building a customized security blueprint based on your industry, software development lifecycle, and business needs to cost-effectively mitigate risks.