Open Source Risk: Mitigation, Security and Protection - Final Days to Register
FREE Admission  |  Lunch Will Be Served  |  PDH Credit

Complimentary Symposium for Open Source Security Professionals

Computer History Museum

Thursday, May 2  |  9:30am – 1:00pm PST  |  Computer History Museum, Mountain View, CA

You’re invited to join a select group of open source security professionals, for a complimentary half-day seminar.

Attend this free event including lunch, to master how to identify vulnerabilities in your open source libraries, software, and components, and explore solutions in real-time from the experts.

You and your team will learn:

  • What developers can do to mitigate the risks in open source software
  • The new trends in open source library security
  • Exactly why and how open source libraries are increasing risk
  • How to keep up with vulnerabilities in open source projects, while keeping the bad guys out
  • Best practices for incorporating open-source software in SDL process

Approved for 3 hour PDH credit! (Contact for PDH.)

Speakers include:


Risks in the Software Supply Chain. Dr. Mark Sherman is the Technical Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data analytics in cyber security.



Open Source Software and the Security Development Lifecycle. Richard Chow is a University Research Director and Scientist at Intel Corporation. In the past, he has held positions as Research Scientist at PARC, and Security Architect at Yahoo and Motorola. His work concentrates on security and privacy, particularly in relation to artificial intelligence, ubiquitous computing, and usability.




How Understanding Risk is Changing for Open Source Components. Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode, which he co-established in 2006. He oversees security research and technology strategy. He has testified to the U.S. Congress on the subjects of government security and how vulnerabilities are discovered in software.




Register now:

  • Please see Veracode's Privacy Policy. Contact Veracode for more information.
    Veracode will follow up with all registrants about this event and any related questions.

Sponsored by:



CS Members Save on Education

  • Lifelong learning with education and certification activities.
  • Unlimited access to SkillsChoice complete training solutions.
  • Live, interactive, and archived technical webinars.