SlideShare a Scribd company logo
Application Security:
The Next Generation
A Panel Discussion
Our Panelists
Tom Eston
Senior Manager,
Penetration Testing
Veracode
Vikram Kapoor
CTO and Co-founder
Lacework
John Steven
CTO
ZeroNorth
Jeffrey Martin
Director of Product
WhiteSource
Brian Joe
Senior Director,
Product Management
Signal Sciences
eBook available for download
at securityboulevard.com
Attendees also will receive a copy
The State of Application
Security Today
AppSec and the
Cloud
AppSec and Newer
Technologies
Best Practices for Application
Security
The Next Generation of Application Security
Thank You!

More Related Content

PPTX
Cyber Education ISACA 25 April 2017
PDF
Io t ppt
DOCX
Security threats to mobile multimedia applications camera based attacks on mo...
PPTX
Security threats in Android OS + App Permissions
PDF
2015.04.24 Updated > Android Security Development - Part 1: App Development
PPT
Cyber threads and its types
PDF
Smau Milano 2015 - Stefano Zanero
PDF
Smau Bologna 2013 Stefano Zanero
Cyber Education ISACA 25 April 2017
Io t ppt
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats in Android OS + App Permissions
2015.04.24 Updated > Android Security Development - Part 1: App Development
Cyber threads and its types
Smau Milano 2015 - Stefano Zanero
Smau Bologna 2013 Stefano Zanero

What's hot (15)

PDF
Automatic Detection0f Web Application Security Flaws
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
PPTX
Android security
PPTX
Skype presentation
PDF
eMAPT certificate
PDF
Mobile hacking, pentest, and malware
PDF
Debashis banerjee mobile_webappintrosecurity
PPT
Development Processes
PPTX
Android Device Hardening
PPT
Handout infosec defense-mechanism-y3dips
PDF
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
DOCX
SonarNarrative
PPTX
Building secure android apps
PPTX
Android
PDF
Introduction to IOS Application Penetration Testing
Automatic Detection0f Web Application Security Flaws
IRJET - System to Identify and Define Security Threats to the users About The...
Android security
Skype presentation
eMAPT certificate
Mobile hacking, pentest, and malware
Debashis banerjee mobile_webappintrosecurity
Development Processes
Android Device Hardening
Handout infosec defense-mechanism-y3dips
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
SonarNarrative
Building secure android apps
Android
Introduction to IOS Application Penetration Testing
Ad

More from SBWebinars (20)

PDF
Securing Mobile Apps, From the Inside Out
PPTX
SAP Concur’s Cloud Journey
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PPTX
Software-Defined Segmentation Done Easily, Quickly and Right
PDF
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
PDF
Taking Open Source Security to the Next Level
PDF
You're Bleeding. Exposing the Attack Surface in your Supply Chain
PDF
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
PDF
Top 10 Threats to Cloud Security
PDF
Deploying Secure Modern Apps in Evolving Infrastructures
PDF
Reduce the Burden Of Managing SAP With Enterprise Identity Management
PDF
Maturing DevSecOps: From Easy to High Impact
PDF
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
PDF
Reducing Risk of Credential Compromise at Netflix
PDF
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
PDF
The State of Open Source Vulnerabilities Management
PDF
Flow Metrics: What They Are & Why You Need Them
PDF
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
PDF
Building Blocks of Secure Development: How to Make Open Source Work for You
PDF
Take a Bite Out of the Remediation Backlog
Securing Mobile Apps, From the Inside Out
SAP Concur’s Cloud Journey
Top Cybersecurity Threats and How SIEM Protects Against Them
Software-Defined Segmentation Done Easily, Quickly and Right
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Taking Open Source Security to the Next Level
You're Bleeding. Exposing the Attack Surface in your Supply Chain
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Top 10 Threats to Cloud Security
Deploying Secure Modern Apps in Evolving Infrastructures
Reduce the Burden Of Managing SAP With Enterprise Identity Management
Maturing DevSecOps: From Easy to High Impact
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
Reducing Risk of Credential Compromise at Netflix
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
The State of Open Source Vulnerabilities Management
Flow Metrics: What They Are & Why You Need Them
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Building Blocks of Secure Development: How to Make Open Source Work for You
Take a Bite Out of the Remediation Backlog
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Assigned Numbers - 2025 - Bluetooth® Document
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
A comparative analysis of optical character recognition models for extracting...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Spectroscopy.pptx food analysis technology
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)

The Next Generation of Application Security

Editor's Notes

  • #3: Star-studded lineup today. Please everyone introduce yourselves.
  • #4: Today’s discussion is based in part on Security Boulevard.com’s latest ebook, which is now available via download on securityboulevard.com. Attendees also will receive a copy via a download link following the webinar.
  • #5: (John Steven) What are we seeing in terms of the market in general: Where are we? What’s good and bad about it? What’s needed?
  • #6: . (Viikram Kapoor) How is cloud impacting application security, especially in respect to application development?
  • #7: (Tom Eston) How are new technologies (containers, microservices, Kubernetes and edge networking) changing application security?
  • #8: (Jeffrey Martin) What are some of the best practices in application security?
  • #10: Thanks to our panelists, thanks to the audience for their questions (and for attending). Reminder this has been recorded Reminder attendees will receive a download link to the ebook Check Security Boulevard.com for upcoming webinars. Fade to black.