Register Now for the Security Development Conference 2013 and Save!

Last year, the inaugural Security Development Conference brought together leading security professionals from a variety of industries around the world to share security development practices and how their organizations successfully adopted them.  More than 300 organizations attended this conference.  At the conference I had the opportunity to discuss the importance of security development practices with keynote speaker Richard A. Clarke, former Special Advisor to the President for Cyber Security.  I also had the opportunity to discuss the urgency for organizations to adopt security development practices with General Michael V. Hayden, former Director, U.S. Central Intelligence Agency and U.S. National Security Agency.  You can read more about last year’s event in our wrap up blog post.

Registration is now open for the second annual Security Development Conference (SDC 2013) which is being held in San Francisco on May 14th and 15th.  SDC 2013 will bring together some of the best and brightest information security professionals from a variety of industries. Attendees will learn about proven security development practices through interactions with peers, industry luminaries and organizations that have successfully adopted such practices. There are three tracks at SDC 2013 targeting different areas critical to the success of security development. Track sessions will cover the latest security development techniques and processes that can reduce risk and help protect organizations in this rapidly evolving technology landscape.

Register Now and Save $400* – Hurry, Early Bird Ends February 1st.

Track: Engineering for Secure Data
Intended audiences:  Software Engineers – Architects, Developers, Testers/Quality Assurance
Abstract:  Prioritizing security throughout the engineering process is a proven way to reduce risk and proactively improve data security early in development. As the threat landscape evolves, it is increasingly important that we design, architect, code, test, and deploy with clear and proven security practices in place. The Engineering for Secure Data tracks will explore the techniques, tools, and methods available for engineers to integrate security into their everyday work.

Track: Security Development Lifecycle & Data Security
Intended audiences:  Project Management, Process Management and those responsible for Security Metrics
Abstract:  Today’s development organizations are creating software and services at a faster rate than ever before. At the same time, their solutions are being asked to handle more data, protect sensitive information, and integrate more broadly. This track will explore how a diverse set of organizations have integrated security development lifecycle practices into their engineering organizations in ways that maintain their speed of business and improve security.

Track: Business Risk & Data Security
Intended audiences:  Senior Engineering or Compliance Leadership and Business Decision Makers
Abstract:  Business decision makers understand the value of leveraging technology to improve their customer experiences or services. They also see the inherent risks associated with many of these decisions. This track will discuss the security challenges businesses face in securing data and managing risk as well as the solutions and methods used across the industry to improve security and protect data.

Sponsorship Opportunities Available
Diamond, Gold and Silver level sponsorships are available. Contact the Security Development Conference Sponsor Team for more information.

*Early Bird Registration ends February 1, 2013 at 11:59 pm PST; discount is shown in United States Dollars only.

Register Now

Tim Rains
Director
Trustworthy Computing

 

About the Author
Tim Rains

Director, Cybersecurity & Cloud Strategy

Tim Rains has over 20 years of experience in the technology industry across several disciplines including engineering, consulting, and marketing communications roles. He currently manages security marketing and corporate communications in the Trustworthy Computing division at Microsoft. His expertise ranges Read more »