From practice: How do you test security from the source (code) and what other opportunities does this analysis offer?
On average, there are 30,000 cyber attacks worldwide per day. Hacks and data leaks cost organizations 10 billion euros annually. Enough reasons to make cybersecurity the order of the day within your organization.
Today, cybersecurity often depends on being able to find vulnerabilities during testing. Why not trace and fix those vulnerabilities at the source? Analyzing the operation of your system in the source code offers significant advantages. It makes hidden vulnerabilities visible and allows you to intervene in time.
How does such an analysis work? What steps need to be taken to significantly reduce the risk of your organization being hit by one of those 30,000 cyber attacks? And what other opportunities does analyzing your software quality offer, for example in the area of adaptability and testability of the source code? During the Software Improvement Group (SIG) lecture at the Industrial Cyber Security event on October 9, experts ir. Tibor Lapikas, Rob van der Veer and René de Grauw will take you through the practice using striking examples and a proven evaluation model.
Follow our lecture: October 9 at 3:00 PM
As an independent organization, Software Improvement Group (SIG) has the largest benchmark in the industry of more than 25 billion lines of code across hundreds of technologies. SIG's expert consultants use this benchmark to analyze your organization's IT assets for security and maintainability, among other things. In this way, SIG helps organizations achieve their business objectives by fundamentally improving the health and security of their software.
Register for the Industrial Cyber Security Event on October 9 and follow the lecture from our experts Tibor Lapikas, Rob van der Veer and René de Grauw.