Quality is delighting customers
Time: January 24, 2013 from 10am to 10:30am
Location: Your Computer
Website or Map: https://www1.gotomeeting.com/…
Event Type: webinar:, cloudy, with, a, chance, of, cyber-attacks, -, securing, cloud-based, applications
Organized By: Tej Singh
Latest Activity: Jan 16, 2013
Distributed denial-of-service attacks, SQL injections, and other security breaches are lurking in the cloud for their chance to wreak havoc on computers, servers, networks, and mobile devices. Security standards, such as NIST (SAMATE), CWE, OWASP, and PCI DSS offer invaluable guidance, but enforcing a security policy based on these standards is shady at best.
In this webinar, we’ll discuss the most effective development testing activities for ensuring application security, as well as how to ensure that your development team is consistently adhering to your development policy.
We’ll also cover:
New cloud service technologies that have made software infrastructure more vulnerable.
The exorbitant costs of failing to meet security standards.
The most effective development testing solution for improving application security.
To register, please click on the following link:
Tej Singh has decided to hide the list of guests.