sponsored by IBM
Posted:  09 Jun 2011
Premiered:  Jun 7, 2011, 13:30 EDT (17:30 GMT)
Format:  Audio
Type:  Podcast
Language:  English
ABSTRACT:

For years the software development community has increasingly embraced an iterative and incremental methodology for software development - Agile. It has driven significant business value through faster, more responsive features and functionality based on market and client demand. What does this development method mean for the an intrinsically process dependent security requirement? Is it possible to develop applications using Agile practices and yet retain a high level of software security assurance?

Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss:

  • Why the development team should care about security
  • Steps organizations should take towards application security
  • Relevancy and feasibility of security in an agile model
  • Best practices and techniques to support security in an agile environment
  • And more



Speaker

Patrick Vandenberg
Manager, Rational Security Marketing

Patrick Vandenberg, Manager of IBM Rational Security Marketing  is responsible for the strategic marketing and execution of the Rational AppScan portfolio. Patrick came to IBM through the acquisition of Watchfire in 2007 and brings 17 years experience in product management, product marketing, software development and sales, and most notably 12 years in the security industry.



BROWSE RELATED PODCASTS
Agile Manufacturing | Application Development | Application Security | Secure Application Development | Security Management | Software Development Methodologies

View All Resources sponsored by IBM

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement