How to Prioritize Security Risks and Fixes

There are more “high-severity” vulnerabilities and threats than there are time and resources to fix them. How do you know what application vulnerabilities must be remediated right away, which can wait, and what you do to respond? Find out from the experts in this newly launched webinar.

On Demand
1h 00min

Attend this webinar and you'll:

  • Be better able to assess your organization's unique cyber risk posture.
  • Learn the tools and techniques to keep you up to date with threats and help prioritize solutions.
  • Know how to empower your developers (or DevSecOps squad) and maintain secure code.

Featured Speakers

  • John Pironti
    John Pironti
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Arun Balakrishnan
    Arun Balakrishnan
    VP of Product and Customer Success

    Arun has 12+ years experience in cyber security across product management, product marketing, customer success, and engineering functions. Prior to ShiftLeft, Arun worked and consulted for security companies including Symantec, Imperva, McAfee, and Trend Micro. Arun earned his M.B.A. from the Tuck School of Business at Dartmouth and B.S in Computer Science and Engineering from Cochin University.

  • Sara Peters
    Sara Peters
    Editor in Chief

    Sara Peters is the Editor in Chief at InformationWeek and formally a Senior Editor at Dark Reading and editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By