Disclosures 2012: The Vulnerability of Publicly Traded Companies

Disclosures 2012: The Vulnerability of Publicly Traded Companies
Disclosures 2012: The Vulnerability of Publicly Traded Companies

Disclosures 2012: The Vulnerability of Publicly Traded Companies

Date: Thursday, May 10th
Time: 11:00 a.m. ET/ 8:00 a.m. PT
Register: HERE

The proliferation of cyber attacks that we have witnessed in the past year has sparked intense interest in the disclosure of cybersecurity risks by public companies.  Public companies are subject to greater compliance requirements, generally have more funding, and were recently encouraged by the SEC to disclose material cybersecurity risks in their SEC filings.  Therefore, Veracode's State of Software Security feature supplement focuses on understanding whether public companies' software security posture is different or even better than all companies in general and what material risks they face due to the weaknesses in their software applications.

We analyzed data from 126 public companies who analyzed applications on our platform during the last 18 months.  We report on the most prevalent vulnerability categories in public company software applications, security compliance against industry standards, and estimate the basic security knowledge of developers. We also examine what public companies are doing to manage the risks inherited from commercial software, outsourced software and third-party frameworks and libraries that are the building blocks of internal software development.

In this webinar you will learn:

  • What vulnerabilities commonly occur in software in the public companies and how they are linked to cybersecurity risks?
  • Why so many applications are vulnerable to industry standard lists of the most frequently exploited application vulnerabilities?
  • What factors influence key decisions and policies regarding application security in an organization?.

Featured Speakers

Chris Wysopal, Co-Founder, CTO & Chief Information Security Officer, Veracode


Sponsored by:

close

Next Article in Vendor Webcasts

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...