Show me the Security - Mitigating Risks with Vendor-Supplied Software
sponsored by Veracode, Inc.

The risks that vendor supplied software can pose to the integrity of your business' security are significant. Vendors and partners may not utilize SDL practices, code can be full of critical vulnerabilities and back doors, and confidential data could be left unprotected.

In this webinar, Chenxi Wang of Forrester Research and Chad Holmes of Veracode will show you how to mitigate the risks of vendor supplied software. Topics include mobile apps and data security, third-party security practices, and enterprise security best practices.

Brought to you by Veracode

Speakers:

Chenxi Wang is vice president and principal analyst serving security & risk professionals at Forrester Research, Inc. She is a leading expert on mobile security, endpoint security, application security, and cloud security. Her research builds on her in-depth technical insights and her years of research experience.

Chad Holmes is director of sales enablement at Veracode. He has over ten years of software development and application security experience, and has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns.

 

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement