Coding Security Best Practices
WORKSHOP ABSTRACT / OBJECTIVE
Secure coding is important for every development, engineering team. 80% of software security problems are caused by insecure coding, which is why secure coding standards are essential. There are several secure coding practices to practice. That’s reason you need a secure coding standards, rules and guidelines used to prevent security vulnerabilities
SECURE CODING IMPORTANCE:
Secure coding standards are important because they help to ensure that software is safeguarded against security vulnerabilities. secure coding is important for every development team regardless of whether it’s code for mobile, SAAS, Cloud, or embedded devices.
SECURE CODE BENEFITS:
Building a Secure Development Lifecycle will be led to positive impact by reducing risk to customers, company’s brand, increase customer satisfaction and trust. Also, reducing sustaining and code maintenance costs and earning a leadership in the marketplace. Below are few key advantages for coding securely.
- Greater Collaboration
- Increased Visibility
- Shorter Release Cycle
- financial advantages of producing trustworthy software
I am planning to conduct workshops by giving hands on exercises to audience to understand Security principles that needs to be consider in secure coding practices to audience
TABLE OF CONTENTS (ToC)
Day 1
- Secure programming of application code
- Understand how to mitigate and not introduce vulnerabilities in applications
PRE-REQUISITES:
- Knowledge of programming languages
REQUIREMENTS
Hardware
- Computer, Mobile access
Software
- None
WHO SHOULD ATTEND
Software Developers, QA Engineers, Software Architects, Code Reviewers
WHAT TO EXPECT:
- Importance of Secure Coding
WHAT NOT TO EXPECT:
- Coding Sessions
SPEAKER PROFILES:
Viraj Gandhi, Sr Staff Product Security Engineer at SailPoint, holding Masters and Bachelor's degree in Computer Science.
Spent a decade in Agile/Scrum software development before plunging into cybersecurity space.
In-depth knowledge of common web application vulnerabilities (OWASP Top Ten)
Designing processes for security reviews, threat modeling, and partnering with product engineering teams
Experience working across teams to help drive security improvements across the enterprise by providing security advice and risk assessment.
A strong advocate for equity at the Workplace and currently volunteering with WiCyS, a community promoting the advancement of women in the cybersecurity workforce.