SlideShare a Scribd company logo
Application Security:
The Next Generation
A Panel Discussion
Our Panelists
Tom Eston
Senior Manager,
Penetration Testing
Veracode
Vikram Kapoor
CTO and Co-founder
Lacework
John Steven
CTO
ZeroNorth
Jeffrey Martin
Director of Product
WhiteSource
Brian Joe
Senior Director,
Product Management
Signal Sciences
eBook available for download
at securityboulevard.com
Attendees also will receive a copy
The State of Application
Security Today
AppSec and the
Cloud
AppSec and Newer
Technologies
Best Practices for Application
Security
The Next Generation of Application Security
Thank You!

More Related Content

PPTX
Cyber Education ISACA 25 April 2017
John D. Johnson
 
PDF
Io t ppt
Nalini Kanth
 
DOCX
Security threats to mobile multimedia applications camera based attacks on mo...
JPINFOTECH JAYAPRAKASH
 
PPTX
Security threats in Android OS + App Permissions
Hariharan Ganesan
 
PDF
2015.04.24 Updated > Android Security Development - Part 1: App Development
Cheng-Yi Yu
 
PPT
Cyber threads and its types
SUNODH GARLAPATI
 
PDF
Smau Milano 2015 - Stefano Zanero
SMAU
 
PDF
Smau Bologna 2013 Stefano Zanero
SMAU
 
Cyber Education ISACA 25 April 2017
John D. Johnson
 
Io t ppt
Nalini Kanth
 
Security threats to mobile multimedia applications camera based attacks on mo...
JPINFOTECH JAYAPRAKASH
 
Security threats in Android OS + App Permissions
Hariharan Ganesan
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
Cheng-Yi Yu
 
Cyber threads and its types
SUNODH GARLAPATI
 
Smau Milano 2015 - Stefano Zanero
SMAU
 
Smau Bologna 2013 Stefano Zanero
SMAU
 

What's hot (15)

PDF
Automatic Detection0f Web Application Security Flaws
Aung Khant
 
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET Journal
 
PPTX
Android security
Mobile Rtpl
 
PPTX
Skype presentation
younes Anas
 
PDF
eMAPT certificate
AnielloGiugliano1
 
PDF
Mobile hacking, pentest, and malware
Ammar WK
 
PDF
Debashis banerjee mobile_webappintrosecurity
debashisb
 
PPT
Development Processes
sblom
 
PPTX
Android Device Hardening
anupriti
 
PPT
Handout infosec defense-mechanism-y3dips
Ammar WK
 
PDF
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
NoNameCon
 
DOCX
SonarNarrative
Ryan Stover
 
PPTX
Building secure android apps
Kaushal Bhavsar
 
PPTX
Android
Younus Shanto
 
PDF
Introduction to IOS Application Penetration Testing
Ammar WK
 
Automatic Detection0f Web Application Security Flaws
Aung Khant
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET Journal
 
Android security
Mobile Rtpl
 
Skype presentation
younes Anas
 
eMAPT certificate
AnielloGiugliano1
 
Mobile hacking, pentest, and malware
Ammar WK
 
Debashis banerjee mobile_webappintrosecurity
debashisb
 
Development Processes
sblom
 
Android Device Hardening
anupriti
 
Handout infosec defense-mechanism-y3dips
Ammar WK
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
NoNameCon
 
SonarNarrative
Ryan Stover
 
Building secure android apps
Kaushal Bhavsar
 
Android
Younus Shanto
 
Introduction to IOS Application Penetration Testing
Ammar WK
 
Ad

More from SBWebinars (20)

PDF
Securing Mobile Apps, From the Inside Out
SBWebinars
 
PPTX
SAP Concur’s Cloud Journey
SBWebinars
 
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
SBWebinars
 
PPTX
Software-Defined Segmentation Done Easily, Quickly and Right
SBWebinars
 
PDF
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
SBWebinars
 
PDF
Taking Open Source Security to the Next Level
SBWebinars
 
PDF
You're Bleeding. Exposing the Attack Surface in your Supply Chain
SBWebinars
 
PDF
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
SBWebinars
 
PDF
Top 10 Threats to Cloud Security
SBWebinars
 
PDF
Deploying Secure Modern Apps in Evolving Infrastructures
SBWebinars
 
PDF
Reduce the Burden Of Managing SAP With Enterprise Identity Management
SBWebinars
 
PDF
Maturing DevSecOps: From Easy to High Impact
SBWebinars
 
PDF
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
SBWebinars
 
PDF
Reducing Risk of Credential Compromise at Netflix
SBWebinars
 
PDF
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
SBWebinars
 
PDF
The State of Open Source Vulnerabilities Management
SBWebinars
 
PDF
Flow Metrics: What They Are & Why You Need Them
SBWebinars
 
PDF
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
SBWebinars
 
PDF
Building Blocks of Secure Development: How to Make Open Source Work for You
SBWebinars
 
PDF
Take a Bite Out of the Remediation Backlog
SBWebinars
 
Securing Mobile Apps, From the Inside Out
SBWebinars
 
SAP Concur’s Cloud Journey
SBWebinars
 
Top Cybersecurity Threats and How SIEM Protects Against Them
SBWebinars
 
Software-Defined Segmentation Done Easily, Quickly and Right
SBWebinars
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
SBWebinars
 
Taking Open Source Security to the Next Level
SBWebinars
 
You're Bleeding. Exposing the Attack Surface in your Supply Chain
SBWebinars
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
SBWebinars
 
Top 10 Threats to Cloud Security
SBWebinars
 
Deploying Secure Modern Apps in Evolving Infrastructures
SBWebinars
 
Reduce the Burden Of Managing SAP With Enterprise Identity Management
SBWebinars
 
Maturing DevSecOps: From Easy to High Impact
SBWebinars
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
SBWebinars
 
Reducing Risk of Credential Compromise at Netflix
SBWebinars
 
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
SBWebinars
 
The State of Open Source Vulnerabilities Management
SBWebinars
 
Flow Metrics: What They Are & Why You Need Them
SBWebinars
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
SBWebinars
 
Building Blocks of Secure Development: How to Make Open Source Work for You
SBWebinars
 
Take a Bite Out of the Remediation Backlog
SBWebinars
 
Ad

Recently uploaded (20)

PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Software Development Methodologies in 2025
KodekX
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 

The Next Generation of Application Security

Editor's Notes

  • #3: Star-studded lineup today. Please everyone introduce yourselves.
  • #4: Today’s discussion is based in part on Security Boulevard.com’s latest ebook, which is now available via download on securityboulevard.com. Attendees also will receive a copy via a download link following the webinar.
  • #5: (John Steven) What are we seeing in terms of the market in general: Where are we? What’s good and bad about it? What’s needed?
  • #6: . (Viikram Kapoor) How is cloud impacting application security, especially in respect to application development?
  • #7: (Tom Eston) How are new technologies (containers, microservices, Kubernetes and edge networking) changing application security?
  • #8: (Jeffrey Martin) What are some of the best practices in application security?
  • #10: Thanks to our panelists, thanks to the audience for their questions (and for attending). Reminder this has been recorded Reminder attendees will receive a download link to the ebook Check Security Boulevard.com for upcoming webinars. Fade to black.