13:40 Case: Security by Design, beyond the code
Security for applications requires reaching far beyond DevSecOps; data flows must also be integrated in the security requirements. To protect all data flows in the supply chain, Greenyard is securing the network infrastructure as well as the external connections. In this presentation, you’ll find out about their approach to achieving this.
Johan Stronkhorst, Group ICT Security Manager, Greenyard (English)
14:10 Interactive discussion
Moderated by Danielle Jacobs, CEO, Beltug.
We would like to hear more about the questions and pitfalls you face, and the experiences you can share for this issue – which is ranked in the Top 5 of security priorities of our members.
Some of the topics we already have in mind for the discussion include:
- Where to start in your strategy: should you take a top-down or bottom-up approach?
- Challenges in achieving the 100% by design security
- Security by (Design AND/OR Configuration)
These are only a few of the elements we can address: please email your additional topics to Ann so we can prepare this session in an optimal way.
Discussion in French & Dutch.
15:00 Wrap up & end