AppSec for the Win: Proven Best Practices that Work
AppSec for the Win: Proven Best Practices that Work

Sponsored By:

Mend Color
On Demand

Available Now

Protecting applications from vulnerabilities and attacks is essential for all roles, from developers to IT leaders. By following proven best practices, organizations can effectively safeguard their applications and protect against security threats.

Join Chris Lindsey (Application Security Evangelist at Mend.io), as he shares proven best practices that will keep your application security program secure and on the right track.

From real world examples, we will walk you through the following:

  • Fix Campaign: Focused effort that securely addresses hundreds of findings in less than a week
  • Developer Training: From on-boarding, hack-a-thons to beyond, learn how to successfully help train developers
  • Container Security: safeguard container environments and avoid releasing compromised software.
  • Relationships: Fix silos and get your teams to work together in collaboration
  • Scaling for Success: Managing a lot with just a little effort
This session will equip you with the knowledge and tools to build more secure applications and stay ahead of potential threats.

Register Below to Watch:

We'll send you an email confirmation. 

Chris Lindsey

Chris Lindsey

Application Security Evangelist - Mend.io
Chris Lindsey is a seasoned speaker who has appeared at conferences, webinars, and private events. Currently building an online community and creating a podcast series, Chris draws on expertise from more than 15 years of direct security experience and over 35 years of experience leading teams in programming and software, solutions, and security architecture.
For three years, Chris built and led an entire application security program that includes the implementation of mature AppSec programs, including oversight of security processes and procedures, SAST, DAST, CSA/OSA, compliance, training, developer communication, code reviews, application inventory gathering, and risk analysis.