Information Systems Security Association, Inland Empire Chapter

Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors & Data

Presented by Clint Pollock, Senior Solutions Architect, Veracode on Tuesday, April 27, 2010 from 11:30am- 1:30pm.

Coco's Restaurant and Bakery
60 West Foothill Boulevard, Upland, CA 91786

RSVP by Monday, April 23rd to

Crystal Lucero
charlie lima uniform charlie echo romeo oscar @ charlie sierra uniform sierra bravo . echo delta uniform
(909) 537-5099

Abstract

With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.

In this session we will cover:

Biography

Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their online business risk. Clint's greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL.

Fees

Checks or Cash

© 2008 Inland Empire Chapter of ISSA