Half-Day Seminar about Open Source Libraries and Their Risk
FREE Admission  |  Lunch Will Be Served  |  PDH Credit

LIVE EVENT: Open Source Security Risks, Challenges, and New Solutions

Computer History Museum

Thursday, May 2  |  9:30am – 1:00pm PST  |  Computer History Museum, Mountain View, CA

Join the IEEE Computer Society’s special event that will answer your most pressing questions about open source risks, vulnerabilities, and solutions.  Technical experts will present useful information and answer specific questions from attendees during the Open Source Discussion Panel.

Approved for 3 hour PDH credit! (Contact dsims@computer.org for PDH.)

 

Don’t miss this important event. You and your team will learn:

  • What developers can do to mitigate the risks in open source software
  • The new trends in open source library security
  • Exactly why and how open source libraries are increasing risk
  • How to keep up with vulnerabilities in open source projects, while keeping the bad guys out
  • Best practices for incorporating open-source software in SDL process

Learn from the experts:

Dr-Mark-Sherman

Risks in the Software Supply Chain

Dr. Mark Sherman is the Technical Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data analytics in cyber security.

 

 

 

Open Source Software and the Security Development Lifecycle

Richard Chow is a University Research Director and Scientist at Intel Corporation. In the past, he has held positions as Research Scientist at PARC, and Security Architect at Yahoo and Motorola. His work concentrates on security and privacy, particularly in relation to artificial intelligence, ubiquitous computing, and usability.

 

 

Chris-Wysopal

How Understanding Risk is Changing for Open Source Components

Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode, which he co-established in 2006. He oversees security research and technology strategy. He has testified to the U.S. Congress on the subjects of government security and how vulnerabilities are discovered in software.

 

 

Register now:

  • Please see Veracode's Privacy Policy. Contact Veracode for more information.
    Veracode will follow up with all registrants about this event and any related questions.


Sponsored by:

Veracode_logo

 

CS Members Save on Education

  • Lifelong learning with education and certification activities
  • Unlimited access to SkillsChoice complete training solutions
  • Live, interactive, and archived technical webinars