- This event has passed so registration is closed.
Attacks to software supply chains are increasing between 3-6x per year and are causing havoc ranging from operational disruption and brand damage, to fines and penalties. Application Security teams are already stretched thin with “security issue fatigue” and suffer from a lack of resources and talent to deal with this new growing attack surface. A new approach is needed to secure software supply chains and better manage risks for your software applications and your overall business. Join industry veterans Erik Bataller, VP of Information Security at ACV Auctions, and Liav Caspi, CTO of Legit Security, to discuss practical new techniques to score and prioritize AppSec risks in today’s software supply chains. Learn how to reduce the likelihood of successful attacks while also enabling new collaborative approaches with development teams to improve your security posture. In this webinar you will learn:
- Common patterns cybercriminals use to infiltrate your pre-production development environments and embed vulnerabilities in your software
- Best practices for scoring and prioritizing the risks associated with your software supply chain
- New approaches to collaborate with development teams to jointly improve software supply chain security and respond faster to new threats
- Tools for elevating your application security risk conversations to the business executive and board room level
Alex Grohmann – Founder, Sicher Consulting
Mr. Grohmann (CISSP, CISA, CISM and CIPT) is founder of Sicher Consulting and a member of the ISSA international board of directors. He is a long time member of ISSA including being president of the Northern Virginia chapter for three years. He is also a member of the ISSA Honor Roll.
Liav Caspi – CTO and Co-Founder, Legit Security
Liav Caspi is CTO of Legit Security and has a long background as a cyber-security expert starting in the Israeli unit of 8200 in various engineering, team lead, and project management roles. In previous roles, Liav worked at Argus Cyber Security building security into automotive-oriented software. He then joined an early-stage startup that was acquired by Checkmarx and led the architecture and the product management of the SCA solution – the first SaaS solution by Checkmarx dealing with open source security. In his free time, Liav enjoys technology, traveling, food, and learning new languages.
Erik Bataller – VP of Information Security, ACV Auctions
Erik Bataller is a father, cybersecurity executive and leader. He has been working in and leveraging bleeding edge and advanced technologies for three decades. As an organizational leader, he believes that success is determined by taking accountability for outcomes and the willingness to adjust rapidly, trusting in people, and having the wherewithal to creatively utilize technology. He has an affinity for working with early-stage startups and helping them focus on key value propositions and strategic visions.
Erik is currently the VP of Information Security of ACV Auctions, Inc. where he and his team are responsible for cyber risk. He is also an Advisory Board member for Cyera, Legit Security, Cyberstarts and Permiso. Previously he served as Sr. Director of SecOps for GitHub and, prior to that he was a Global Manager at Veracode running the practice for their largest customers to establish and manage their software supply chain application security risk.
Alex Babar – Director of Product Marketing, Legit Security
Alex Babar is the Director of Product Marketing at Legit Security. Previously, Alex held various product marketing and product management roles in the identity and access management security space with Ping Identity. In his free time, Alex is an avid tennis player, automotive enthusiast, and aspiring home cook.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.