Pits in Application Security and how to avoid them
Shift left- Extend Right How to Overcome the Pitfalls in your Application Security and Fasten SDLC  
calendar-alt-min
Date:
Nov 24th,Tuesday
calendar-alt-min
Time:
 3:00-4:00 PM IST
calendar-alt-min

Hosts:
Mateo Martinez

Vaidyanath 

About host
circle-cropped-1

Mateo Martinez He has been a consultant in various aspects of cybersecurity in most Latin American countries, executing ethical hacking projects, incident response and digital forensics, creation of CSIRT, creation of business continuity plans and disaster recovery plans, has implemented the ISO 27001 standard and has developed cybersecurity policies and processes in large organisations. He has been a professor of multiple cybersecurity courses to various governments and organisations..

"See you at 3:00 PM to find out how to shift your application security from manual to automated in days!
circle-cropped

Vaidyanath heads business development at Appknox. 

Vaidyanath carries over 14 +years experience in applying  digital Innovation strategies in large enterprises. Currently he helps Enterprises, Banks and Appknox customers to setup best in class security technologies into practice to reduce threats and stay updated with all necessary compliance's.
"Are you ready for some fun, learning, and discovery?
Book your slots today! - limited seats."
Overcome Pitfalls in your Application Security and Fasten SDLC .

A Learn the best approaches  to solve the most critical aspects of your application security program and how to proactively secure your applications in production and development phases of SDLC   

Agenda

white_shield_icon

Implementing rapid application development at scale with Devsecops

white_shield_icon

Identifying and eliminating pitfalls in Appsec

white_shield_icon

Benefits and Ways to Automate Security in SDLC.

white_shield_icon

Reducing SDLC Timelines by Integrating CI-CD Tools.

Happy Learners
Still need convincing? Check out what people are saying
photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo1
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo6
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
This webinar will be of interest to:
  • Information Technology Heads

  • Security Architects

  • Product Managers

  •  Director- Information Information Security 

  • CISO’S