1、 Okta and/or its affiliates.All rights reserved.Okta and/or its affiliates.All rights reserved.Managing Open Source Software Security in Your OrganizationJos Carlos ChvezSecurity Software Engineer Ok。
2、Modern API Security 2024 Carnegie Mellon University1DISTRIBUTION STATEMENT A This material has been approved for public release and unlimited distribution.Please see Copyright notice for non-US Gover。
3、October 11,2024C I S A|C Y B E R S E C U R I T Y A N D I N F R A S T R U C T U R E S E C U R I T Y A G E N C YIS OUR WORLD SECURE YET?(ARE WE EVEN CLOSE?):AN UPDATE ON CISAS SECURE BY DESIGN INITIATI。
4、Microservice and API Risks and Mitigations 2024 Carnegie Mellon University1DISTRIBUTION STATEMENT A This material has been approved for public release and unlimited distribution.Please see Copyright 。
5、12Two things up front:First:Credit where due title art is from a usefully named bad 2010 TV movieNext:I will not be discussing this movie today,sorry!3Instead,Ill be discussing the intersection of qu。
6、 2024 Carnegie Mellon University1DISTRIBUTION STATEMENT A This material has been approved for public release and unlimited distribution.2024 Carnegie Mellon UniversityDISTRIBUTION STATEMENT A This ma。
7、CLINT DOVHOLUKSecure Software by Design 2024PROTECTING APIS WITH ZERO TRUST OVERLAY MESH NETWORKSABOUT METHIS IS DEFINITELY NOT ME“Developers dont care about security“VERY COMMON THEME“SHIPPING IS A 。
8、Intelligent and Predictive Failover-The race against errors by marching towards Resiliency.!TEJA SWAROOP MYLAVARAPU(Lead Software Engineer-Capital One)1.Terminology Definitions2.What is Resiliency?3.。
9、Sustainable IT is Secure ITBuilding a Resilient and Responsible Digital FutureSEI Secure Software By Design 5 August 2024Making Software Greener,Ltd.http:/MakingSoftwareGLink to Slideshttps:/ Softwar。
10、BUILDING SECURE INFRASTRUCTURE:WHAT DEVELOPERS NEED TO KNOWINTRODUCTIONMichael McCabeCEO of Cloud Security PartnersHelp clients with cloud strategy and securityPassionate about infrastructure as code。
11、A Developers Guide to Making a Deal with SecurityFour questions that outline how both development and security can get what they want?Larry MaccheroneDevSecOps Transformation,Contrast SecurityLinkedI。
12、Copyright 2024 QA Consultants All Rights Reserved1Good vs.Evil:AI Attack Mitigation StrategiesSteve McGeown,QAC Security Practice LeaderAugust 6,2024Copyright 2024 QA Consultants All Rights Reserved2。
13、The Emerging Technology of Software Behavior Computation for Security and CorrectnessRick LingerAssuranceLabs Inc.1Copyright 2024 AssuranceLabsrick.lingerassurancelabs.tech202-701-6257SEI 2024 Secure。
14、AcceleratingApplication Refactoring:AI in DevSecOpsJoel KrooswykFederal CTOSecure Software by DesignAugust 7,2024 2024 GitLab Inc.State of the Union in DevSecOpsMemory SafetyMemory SafetyOSSOSSAI Acc。
15、 2024 Carnegie Mellon University1Distribution Statement A Approved for public release and unlimited distribution.2024 Carnegie Mellon UniversityDistribution Statement A Approved for public release an。
16、Secure by Design Workshop 2024 Carnegie Mellon University1DISTRIBUTION STATEMENT A This material has been approved for public release and unlimited distribution 2024 Carnegie Mellon UniversityDISTRIB。
17、Automated Repair of Static Analysis Alerts 2023 Carnegie Mellon University1DISTRIBUTION STATEMENT A This material has been approved for public release and unlimited distribution.2023 Carnegie Mellon 。
18、THE CALL IS COMING FROM THE CALL IS COMING FROM INSIDE THE HOUSEINSIDE THE HOUSEAPI ABUSE BY AUTHENTICATED USERSAPI ABUSE BY AUTHENTICATED USERSAMIR SHARIFAMIR SHARIFSECURE SOFTWARE BY DESIGNSECURE S。