For faster time to market and deeper functionality, a popular trend is using third party components in application development. However, these components may come with insidious security vulnerabilities discovered at a later date, after the application is already in production. Join Krishnan Dhapdapani, an information security professional, for an insightful discussion on how to come up with a plan to remediate these potential security flaws.

Topics include:

  • How to proactively prevent vulnerabilities
  • Best practice do’s and don’ts for third party component integration
  • Key security considerations
Special Guest Speaker

Krishnan Dhandapani
Information Security Professional

Krishnan Dhandapani graduated from The University of Kansas, home of the Jayhawks, with a graduate degree in Computer Science. He has been in the software industry for more than two decades, with the recent half in security. What he learns from his work and research, he shares with students as adjunct professor in Bay Area Universities. His current research topics include application security, cryptography, and continuous delivery + security.

The Dos & Don’ts for Securely Using Third-Party Components In an Insecure World

Public clouds used/planning to use?
(Select all that apply)