Webinar | Mitigating Business Risk By Building Secure Software
There have been many high profile security breaches in recent years. Many international standards for information security focus on the security of existing systems and infrastructure like networks and workplaces. Software development is often treated as an after thought. Implicitly, it is assumed that developers or the supplier is concerned about security, while client often makes too few explicit demands regarding security.
Application security, sometimes referred to as security by design, isn’t easy to implement. In order to get a better grip on security and reduce risks of data leaks, there is a need for a method that provides information security requirements to the supplier prior to development. In this webinar we will discuss international standards and best practices for adopting security by design why you need it and what is about.
Frank Vogelezang, Consultant At METRI
Frank has an extensive career in the pricing and valuation of IT services. The focal point of his experience is in the price-alignment for application services, both for application development as well as application management. The right quality and security for the right price. This is also the basis for bringing together the right service provider and the right customer based on an appropriate sourcing strategy. This includes more than the application services only, but also includes infrastructure, security and cloud services.
Sylvain Cailliau, Technical Director CAST
Sylvain, is Technical Director at CAST and Specialist of the Application Life Cycle Management and DevOps Domains with 25+ years of experience in the Software Industry. Sylvain has a deep knowledge in the main ADM disciplines including Requirement, Development, Configuration, Build, Automated Testing, Release and Services Management. ITIL Certified and SCRUM Master.
Sytse Van Der Schaaf, Research Consultant At METRI
Sytse advises customers on adopting maturing technology trends. He has a broad orientation on the demand side of IT and the way technology can transform the operation and future of organizations.