February 14, 2018 By Neil Jones 2 min read

In her classic music video for the song “Waking Up in Vegas,” Katy Perry and her boyfriend insert a quarter into a slot machine at the laundromat and wake up to an ephemeral high-roller lifestyle with all of its elegant trappings. At Think 2018, IBM Security can offer you a much safer bet: that you’ll wake up each day brimming with newly minted application security testing knowledge by attending our DevOps track at the event.

To help you plan your schedule, here’s a convenient recap of key application security testing content at Think.

IBM AppSec User Group

Join us on Sunday, March 18, for our special Community Day at Think 2018. You won’t want to miss the AppSec User Group, where you’ll hear about the latest developments in application security testing from IBM’s experts and have an opportunity to share your feedback about our plans for the future.

DevOps Client Session

Our compelling application security client session will take place on  Wednesday, March 21. You can check out the details in our convenient agenda builder tool. All you need to do is enter the session number below into the agenda builder:

  • Session No. 8094: “Security at the Speed of Software Development: Comcast’s DevOps Transformation”

In this session, you’ll hear how an actual security practitioner manages application security vulnerabilities on a daily basis.  In preparation for the session, you should also check out our fully-updated Risk Management e-Guide.

Core Curriculum and Think Tank Sessions

On Wednesday, March 21, IBM application security experts Eitan Worcel and Anatoly Bodner will present Core Curriculum Session No. 8199: “Shift Your Application and Data Protection to the Left With a Comprehensive DevOps Strategy.”

The core curriculum session will be followed by four brief Think Tank sessions — each of which will be repeated twice for your convenience — that permit you to dig deep on the following topics.

  • Session No. 8196: “Leverage DevOps and Agile Development to Transform Your Organization’s Application Security Testing”
  • Session No. 8197: “Super-Power Your Application Security Testing With IBM’s Cognitive Capabilities”
  • Session No. 7361: “X-Force Red: Still Better Than Mr. Robot
  • Session No. 8194: “Maximize Effectiveness of Your Software Development Lifecycle (SDLC) with an Empowered DevOps Strategy”

IBM Application Security on Cloud Demo

Finally, don’t forget to check out our Application Security on Cloud solution demo at the IBM Security booth in the event expo center. You’ll learn about the latest developments in cognitive application security testing capabilities, such as intelligent finding analytics and intelligent code analytics, as described in our recent video.

Register Now!

As you can see, you’ll wake up each day at Think 2018 with expanded knowledge about application security that you can take home and share with your peers, whether you’re based in Peoria, Illinois, or Lima, Peru.

Register now, and while visiting the registration page, review our awesome musical entertainment options for the week, which include The Chainsmokers, Train and Barenaked Ladies.

See you in Vegas!

Watch now! View the Think 2018 Security & Resiliency Sessions live or on-demand

More from Application Security

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Audio-jacking: Using generative AI to distort live audio transactions

7 min read - The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and personal lives. While these advancements offer many benefits, they have also presented new challenges and risks. Specifically, there has been an increase in threat actors who attempt to exploit large language models to create phishing emails and use generative AI, like fake voices, to scam people. We recently published research showcasing how adversaries could hypnotize LLMs to serve nefarious purposes simply…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today