Penetration Testing at DevOps Speed and Portfolio Scale
12th February 2020, 6PM
Bentley’s Oyster Bar & Grill | London
Penetration testing is an incredibly valuable way to find vulnerabilities in web applications and APIs. However it just can’t keep up with the speed and scale of modern software. In this discussion, Jeff Williams, Co-Founder & CTO Contrast Security, will draw on many years performing penetration tests on critical applications. He’ll show how software instrumentation can be a force multiplier for penetration testers, allowing them to scale their testing dramatically and turn their new discoveries into code.
Jeff is Co-Founder and CTO of Contrast Security. He’s very active in the DevSecOps community, recently authored the DZone DevSecOps RefCard, and speaks frequently on the topic at conferences like Velocity, DevSecCon, JenkinsWorld, AppSecEU. Jeff is also a founder and major contributor to OWASP where he served as Global Chairman for 9 years and created the OWASP top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many other widely adopted free and open projects.
Bentley’s Oyster Bar & Grill
Address: 11-15 Swallow St, Mayfair, London W1B 4DG
Wednesday, 12th February 2020 | 6PM – 10PM
Contrast solves this complex problem with a bold new secure technology platform that transforms application security by making software self-protecting. Intelligent Contrast agents are injected into the code, instrumenting applications with thousands of smart, agile sensors that detect and correct vulnerabilities before deployment, and protect the software applications in operation. No legacy security tool can protect every application. But a tenacious army of intelligent Contrast sensors can.
The Contrast technology platform is a fundamentally new way to protect a company from threats, giving our customers visibility and accuracy that verges on clairvoyance.
Because Contrast technology works hand-in-glove with agile and DevOps teams, it transforms every software application in a company’s portfolio from a weak spot into a strong point to decisively repel attacks.
Because Contrast technology runs at the speed of business, it transforms everyone responsible for software into defenders of the company, protectors of company data, and guardians of customers’ personal information.