As a result of the growing number and variety of connected devices, it is now evident that most work, play and commerce has a digital dimension. So the time has come for those organisations willing to take advantage of technology to add a digital dimension to customer experiences, and enhance engagement across any device. They can also turn the data generated by these devices into meaningful insights and quickly and effectively use this data for competitive advantage. The ability to master this feedback will be a key differentiator in enabling enterprises on the digital transformation journey, to reshape and gain a leading market position.
To support the enterprise’s transformation, organisations will need to develop agile and innovative capabilities as well as further industrialising IT by exploiting emerging cloud services, automation and building on the foundation of established methods, processes and services.
The thought leaders, experts and speakers at this event will provide valuable insights into how an organisation approaches and manages a complex and transformative project like digital transformation. Including the key question of how to remain focused on balancing cost and value. Find out how drive digital innovation across your organisation, how to adapt, engage, disrupt and survive.
PROGRAMME TO COVER:
WHO SHOULD ATTEND:
We are looking for speakers willing to share their experiences and stories about Digital implementation. If you wish to submit a proposal to present at this event please fill in the speaker response form.
Topics to be covered:
Automatic Penetration Tests
5 July, London
Penetration testing is a healthy combination of manual and automated methods, and a necessary part of a secure SDLC. However, its manual nature means that it can slow down a delivery pipeline, perhaps to the point where it’s moved all the way to the right (post release).
Penetration Testing is a vital activity, discovering logic flaws that could lead to security vulnerabilities. It requires a degree of experience and intuition that cannot be fully replaced by automated tests, but automation is a method by which we can reduce the requirement for manual testing, and introduce regression tests for the issues it uncovers.
The application login flaws discovered through manual testing can often be explained by a failure to meet security requirements, or security requirements that are not sufficiently granular. If security requirements can be translated to specific acceptance criteria, and then tests driven by these acceptance criteria, perhaps we can reduce the potential for application logic flaws.
In this workshop, we will learn how some penetration testing can be automated and moved back to the left of a software delivery pipeline. We will:
To participate, you will need a laptop with the following installed: