<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">

Webinar

Think About Your Audience Before Choosing a Webinar Title


Sponsored by:

Mend-Blue

 

 
On Demand
Anytime

Security was once an afterthought in software design, but today it's an increasingly critical aspect of application development, from design through deployment and beyond. The volume of applications developed, distributed, used and updated over networks is rapidly expanding. As a result, application security practices must address an increasing variety of threats. It's even more complicated when cloud-native applications built using microservices and containers are thrown into the mix.

It is not enough for application security programs to operate by focusing only on compliance. Modern AppSec programs must go deeper and answer much more complicated questions about the integrity of each software component. To be effective, modern AppSec programs must identity pre-built components (open source and proprietary) within software, develop and maintain a software bill of materials (SBOM) for each application and keep dependencies up to date. Developers and AppSec teams must also identity and prioritize the vulnerabilities that pose the biggest risk to their apps, and know which can be safely ignored. They must also know how to apply fixes without worrying about breaking the build and integrate automated remediation. Finally, teams must be able to embed AppSec tools into development workflows and quickly and efficiently onboard developers, as well as being able to find and block malicious software before those devs can download it.

In this program, you'll learn how to:

  • Identify the open source code in your software
  • Create a software bill of materials for each application
  • Keep dependencies up-to-date
  • Identify and prioritize which vulnerabilities pose the biggest risk and which can be safely ignored
  • Apply AppSec fixes, embed AppSec tools into development workflows and use automated remediation
  • Find and block malicious open source software
Jeffrey Martin
Vice President, Product Management - Mend
Jeff has spent over 15 years in Product roles helping both the organizations he worked for and their customers transform and measure their business processes, Development, and QA. He especially enjoys cultural and mindset transformations for their ability to create lasting progress.
Arabella Hallawell
Chief Marketing Officer - Mend
Arabella has been working in the security space for over 20 years and, in addition to her role at Mend, she is also a board member of the National Institute of Standards and Technology (NIST).
Rami Sass
Co-Founder and CEO - Mend
Formerly WhiteSource Software, Rami has grown the company from a small Israeli startup in 2011 to a global business with just under employees across several countries and hundreds of enterprise customers including Microsoft and IBM. 
Mitch Ashley
CTO, Techstrong Group Principal - Techstrong Research
Mitchell Ashley is a renowned strategist and technology executive. Mitchell has led successful IT, SaaS, and cybersecurity transformations. He’s led multiple teams in developing and bringing to market successful online services, cybersecurity, and networking products and services. Mitch serves as Principal of Techstrong Research where he leads a team of preeminent experts in digital transformation, DevOps, cloud-native, and cybersecurity. In this role, Mitch works with companies to align digital transformation and technology strategies to achieve disruptive goals and high impact results. Mitch is in high demand as a speaker at conferences the world over, and his popular DevOps Chats podcast engaging with digital leaders is one of the most widely followed in the field.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.