• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Continuous Application Security at Scale with IAST and RASP

Key Learning Points:

  • SAST, DAST, and WAF tools miss the majority of real vulnerabilities and attacks while generating staggering numbers of false positives.
  • The next generation of application security technology uses dynamic software instrumentation to solve these challenges.
  • Learn how IAST and RASP have revolutionized application assessment and protection in a massively scalable way.

Level: Intermediate

SAST, DAST, and WAF have been around for almost 15 years — they’re almost impossible to use, can’t protect modern applications, and aren’t compatible with modern software development. Recent studies have demonstrated that these tools miss the majority of real vulnerabilities and attacks while generating staggering numbers of false positives. To compensate, these tools require huge teams of application security experts that can’t possibly keep up with the size of modern application portfolios. Fortunately, the next generation of application security technology uses dynamic software instrumentation to solve these challenges. Gartner calls these products “Interactive Application Security Testing (IAST)” and “Runtime Application Self-Protection (RASP).” In this talk, you’ll learn how IAST and RASP have revolutionized application assessment and protection in a massively scalable way.

Join Jeff Williams, appsec expert, to learn how “Interactive Application Security Testing (IAST)” and “Runtime Application Self-Protection (RASP)” have revolutionized application assessment and protection in a massively scalable way.

About Jeff Williams

Jeff is a pioneer in application security, co-founder and CTO of Contrast Security, and the founder of OWASP where he created the OWASP Top 10, and many other widely adopted free and open projects

This session sponsored by Contrast Security. 

Primary Sidebar

Details

Tuesday May 17, 2016
3:00 PM - 4:00 PM
Room 3
Focus: Cybersecurity, ,

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.