Mushegh Hakhinian

VP, Security Architecture Intralinks

SPEAKER INTERVIEW AVAILABLE
BIOGRAPHY

Mushegh Hakhinian has been managing security initiatives for over a decade. He leads the security architecture practice at IntraLinks, a global fintech provider of inter-enterprise content management and collaboration solutions. He is a Certified Information Systems Security Professional, and is a frequent contributor to the IntraLinks security blog as well as industry publications. Prior to joining IntraLinks, Mr. Hakhinian lead security functions at a multi-tenant online banking service provider and an international bank. He had presented at several security conferences, such as the RSA Conference USA, Cloud Security Alliance Congress and InfoSecurity London.

Building application security with 0 money down

In this presentation we will share our experience in building application security process from the grounds up.
Secure development lifecycle models are well publicized. They seem to be self-explanatory on what needs to be done: threat modeling, composition analysis, static code analysis etc.
But we found out that knowing which steps to take and in which order affect immensely the time to eventually successful implementation. Early understanding and buy-in from both engineering management and engineers are invaluable. Last, but not least – carefully planning investments along the way is a major contributor to early successes.

Participants will learn:
– how to insert security checks into important stages of development lifecycle.
– most importantly – in what order introduce the security checks in the process to avoid distractions and maintain agility.
– what open source tools are available to minimize initial costs and get value from day one.
– how establish priorities for investments in tools and training
We will conclude the session with a demo of one of the tools. It is very important to have robust application security process, and though path to full implementation will be specific to each organization – knowing some common traits beforehand will assure the eventual success.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Cosmin Anghel

Digital Forensic Analyst and Incident Responder SecureWorks

Octavian Guzu

CTF Enthusiast & ECSC Team Leader, Software Engineer Bitdefender

Abdullah Joseph

Security Specialist Adjust GmbH

SPEAKER INTERVIEW AVAILABLE

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS