Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Posted by: Adrienne Hall, General Manager, Trustworthy Computing
If you follow this blog regularly, you know that security development policies, tools and practices are at the heart of what Trustworthy Computing does. From my first ever post, to Tim Rains’ recent Cloud Fundamentals video with Steve Lipner, you can see that creating, refining and sharing best practices for how to write code with a goal of reducing the number and severity of vulnerabilities is an ever-present driver for us.
Given how important security development is to our efforts, you can imagine our excitement for the inaugural Security Development Conference taking place May 15-16 in Washington D.C. This is just around the corner and promises to be a fantastic event.
While we previewed the conference a few months ago, I want to be sure you have updated information and an outline as to what attendees can expect.
First and foremost, the Security Development Conference will feature several industry luminaries in keynote roles:
These featured speakers will join a great roster of panelists and session speakers in discussing the central theme of the conference: how to evolve from security development principles to security development practices.
At the conference, attendees can engage with this theme in one of three different tracks:
Security development is a topic that is important for any security professional to have a firm handle on. If you are involved in or are just interested in learning more about security development, sign up now for the Security Development Conference, May 15-16 in Washington, D.C.!