Mushegh Hakhinian

VP, Security Architecture Intralinks

SPEAKER INTERVIEW AVAILABLE
BIOGRAPHY

Mushegh Hakhinian has been managing security initiatives for over a decade. He leads the security architecture practice at IntraLinks, a global fintech provider of inter-enterprise content management and collaboration solutions. He is a Certified Information Systems Security Professional, and is a frequent contributor to the IntraLinks security blog as well as industry publications. Prior to joining IntraLinks, Mr. Hakhinian lead security functions at a multi-tenant online banking service provider and an international bank. He had presented at several security conferences, such as the RSA Conference USA, Cloud Security Alliance Congress and InfoSecurity London.

Building application security with 0 money down

In this presentation we will share our experience in building application security process from the grounds up.
Secure development lifecycle models are well publicized. They seem to be self-explanatory on what needs to be done: threat modeling, composition analysis, static code analysis etc.
But we found out that knowing which steps to take and in which order affect immensely the time to eventually successful implementation. Early understanding and buy-in from both engineering management and engineers are invaluable. Last, but not least – carefully planning investments along the way is a major contributor to early successes.

Participants will learn:
– how to insert security checks into important stages of development lifecycle.
– most importantly – in what order introduce the security checks in the process to avoid distractions and maintain agility.
– what open source tools are available to minimize initial costs and get value from day one.
– how establish priorities for investments in tools and training
We will conclude the session with a demo of one of the tools. It is very important to have robust application security process, and though path to full implementation will be specific to each organization – knowing some common traits beforehand will assure the eventual success.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Maksim Iavich

CEO and President Scientific Cyber Security Association

Manuel Wiesinger

Security Researcher SBA Research

Abdullah Joseph

Security Specialist Adjust GmbH

SPEAKER INTERVIEW AVAILABLE

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS