Securing Software Development – Free ISC2 Virtual Event

nMaintaining strong security practices requires staying in front of changesnand accepting challenges that can impact every phase of the softwarendevelopment lifecycle – from design to disposal and everything in between.n

n

nJoin us fornnISC2 Spotlight: Secure Software Developmentnn, a virtual deep dive into securing applications from start to finish.nWhether you are involved in software design and implementation, or testingnand development, this event will provide timely take-aways and bestnpractices that you can implement in your organization.n

n

nThe virtual two-day event, which includes Q&A with presenters moderatednby Brandon Dunlap, takes place November 8-9. ISC2 members, associates andncandidates can attendee for free and earn 5.5 CPE (Continuing ProfessionalnEducation) credits. The fee for non-members is $129; however, anyone can become an ISC2 Candidate for free to have their registration fee waived. This is the last of highly-rated Spotlight events thisnyear, so don’t miss out!n

n

nAll previous ISC2 Spotlight events have received excellent feedback fromnattendees, including one who said “I thought the timing, sessions, andnduration was perfect. The topics were in line with current issues andnpresented well.”n

n

nThis event will kick-off with a panel of experts in the field speaking onnopen source software (OSS). You won’t want to miss this lively discussion tonlearn what you and your organization needs to know from Shannon Lietz, CEO,nThirdScore; Chris Romeo, CISSP, CSSLP, CEO, Devici; and Ryan Skinner, CISSP,nSecurity+, Senior Manager, Application Security, McDonald’s.n

n

nLater, you’ll be able to take a deep dive into SBOM (software bill ofnmaterials), with Ed Adams, Uma Chandrashekhar and Josh Corman. Thisnpanel of industry experts will unpack SBOM and debate its benefits, risks,ncosts, formats, components and implementation.n

n

nJack Cable, Senior Technical Advisor at CISA says that given thennever-ending cybersecurity attacks, something has to give. On day two of thenevent, he’ll dive into CISA’s Secure by Design which is aiming to shift thenresponsibility of cybersecurity onto technology manufacturers.n

n

nTimothy Serewicz, Director, Training Program atnnThe Linux Foundationnn will discuss some of the challenges of keeping computer programsnsafe as they go from software developers to users. He’ll explain Sigstorenand how to secure the code supply chain, its main tools and how to set upnSigstore in your software process.n

n

nThe event’s full agenda includes:n

n
    n
  • n Open Source Software: The Good, The Bad, The Uglyn
  • n
  • n Secure Updates for Softwaren
  • n
  • n Deep Dive into SBOMn
  • n
  • n Secure by Designn
  • n
  • n SigStore to Secure the Code Supply Chainn
  • n
  • n What You Need to Know About the EU Cyber Resilience Actn
  • n
n

nEveryone is encouraged tonnregisternnas only registered attendees will be able to view the recordings to earn CPEncredits after the live event is complete. Live attendees will earn the CPEncredits automatically which will post to their ISC2 member accounts withinntwo weeks.n

n

nnRegister nownnto secure your spot and earn 5.5 CPE credits!n

]]>

Leave a Comment

Your email address will not be published. Required fields are marked *