<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Security Partnership: The Benefits and Challenges of High Velocity Code Release


Think About Your Audience Before Choosing a Webinar Title

Sponsored by rsa conference


How do you address the security challenges associated with high velocity code release? If you are exploring the double-edged sword that is open source code, this webcast will share the strategies you need in order to effectively build security into the development process without slowing down developers. We’ll be joined by DevOps industry experts who will engage in a hearty discussion focused on the benefits and challenges of high velocity code release. Join us with questions.

Anders Wallgren
VP of Technology Strategy - CloudBees
Anders Wallgren is the VP of Technology Strategy at CloudBees. Anders brings with him over 30 years of in-depth experience designing and building commercial software. Prior to joining CloudBees, Anders held executive positions at Electric Cloud, Aceva, Archistra, and Impresse. Anders also held management positions at Macromedia (MACR), Common Ground Software and Verity (VRTY), where he played critical technical leadership roles in delivering award winning technologies such as Macromedia’s Director and various Shockwave products.
Cindy Blake
Sr. Security Evangelist - GitLab
Cindy Blake is the Senior Security Evangelist at GitLab, a leader in the DevOps market with an innovative single application approach for the entire software development lifecycle. Blake collaborates around best practices for integrated DevSecOps application security solutions with major enterprises. Her book, The CISOs Guide to Securing Next-Gen Software, combines nearly a decade of cybersecurity experience with a background in lean and software development to simplify the complexities of today’s software evolution into pragmatic advice for security programs. Blake has a broad IT background in software, healthcare, and energy starting her career as a Software Developer, Architect, and then IT Leader.
Ed Moyle
Partner - SecurityCurve
Ed Moyle is currently Application Security Principal for Adaptive Biotechnologies and a Partner with SecurityCurve. In his 20 years in information security, Moyle has held numerous positions including: Director of Thought Leadership and Research for ISACA, Senior Security Strategist with Savvis, Senior Manager with CTG, and Vice President and Information Security Officer for Merrill Lynch Investment Managers. Moyle is co-author of Cryptographic Libraries for Developers and Practical Cybersecurity Architecture, and a frequent contributor to the information security industry as author, public speaker, and analyst. 
Stephen Chin
Head of Developer Relations - JFrog
Stephen Chin is Head of Developer Relations at JFrog, member of the CNCF governing board, and author of The Definitive Guide to Modern Client Development, Raspberry Pi with Java, Pro JavaFX Platform, and the upcoming DevOps Tools for Java Developers title from O'Reilly. He has keynoted numerous conferences around the world including Devoxx, JNation, JavaOne, Joker, and Open Source India. Stephen is an avid motorcyclist who has done evangelism tours in Europe, Japan, and Brazil, interviewing hackers in their natural habitat. When he is not traveling, he enjoys teaching kids how to do embedded and robot programming together with his teenage daughter. You can follow his hacking adventures at: http://steveonjava.com.
Joseph Saunders
Founder & CEO - RunSafe Security, Inc
Joe Saunders is the founder and CEO of RunSafe Security, a pioneer of immunizing software without developer friction to enable continuous delivery. He leads a team of former U.S. government cybersecurity specialists who know how attackers think about problems, how they weaponize attacks and how they choose targets. A 25-year veteran of many national security and cybersecurity roles, Joe is on a personal mission to transform cybersecurity by challenging outdated assumptions and disrupting the economics that motivate hackers to attack. Over his career, Joe has built and scaled technology into companies servicing both private sector and public sector security needs. Prior to forming RunSafe Security, Joe advised, invested, and supported multiple security and risk management companies, including Kaprica Security, which had one of its core lines of business acquired by Samsung. He also served in several advisory functions with Sovereign Intelligence, Distil Networks, and Analyze Corp.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.