Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

The Trials & Tribulations of Component Security: Are Organizations at Risk?

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Of organizations using third party components in their applications, only 52% update those components when a new security vulnerability becomes public.

More than ever, IT organizations are relying on third-party code, as it allows them to leverage features and functionality that already exists. However, these organizations need to inventory and manage these components in order to ensure visibility into potential security risk exposure. 
Security reviews also need to be a key part of initial development and procurement processes. Breaches in third-party code, compliance with customer requirements and regulations are all increasing the need for strong third-party code to be secure. 

In this webinar we will explore how organizations can best take on open source risk and elaborate on findings from a recently published Vanson Bourne study with input from 400 applications.

Key takeaways:

  • How IT organizations are approaching DevOps and security’s role within this new paradigm
  • Detailed insights into the level of usage of open source components 
  • The latest trends and practices around application inventory management

Speakers

Mark Curphey

Founder and CEO, SourceClear

    Michael Hill

    Deputy Editor , Infosecurity Magazine

    Raef  Meeuwisse

    CISM, CISA, Author of Cybersecurity for Beginners

      Brought to You by