Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Security Journal Authors: Elizabeth White, Yeshim Deniz, Pat Romanski, Maria C. Horton, Liz McMillan

Related Topics: PC Security Journal, Security Journal

News Feed Item

Fortify Software Experts Join Industry Leaders at Software Security Summit

Fortify Software Experts Join Industry Leaders at Software Security Summit

BALTIMORE, June 5 /PRNewswire/ -- Fortify Software, Inc. announced that company executives will join peers from Oracle Corporation and Johns Hopkins University to discuss critical issues facing the software industry at Software Security Summit East, which convened today. Fortify executives are presenting and leading tutorials on a wide variety of topics of interest to software developers, security analysts, and executives who wish to understand and conquer weaknesses in their software infrastructure.

Software Security Summit East is being held in Baltimore from June 5 - 7, 2006. The full conference program is available at Presentations delivered by Fortify Software executives include:

* "Security Metrics That Matter -- And How to Use Them," presented by Dr. Brian Chess, Chief Scientist * "Top 12 Security Traps for Java," presented by Dr. Brian Chess * "Making Source Code Analysis Part of the Security Review Process," presented jointly by Dr. Chess and Jacob West, Director of Software Security Research * "Hack-proof your SOA," presented jointly by Barmak Meftah, Vice President, Engineering and Operations and Dr. Mohammed Afshar, Director of Product Management at Oracle * "From Theory to Reality: Seven Practical Steps to Delivering More Secure Software," presented by Jacob West

In addition, Roger Thornton, Chief Technology Officer, will lead an all day tutorial covering the implementation of a software security improvement program. Dr. Avi Rubin of the Information Security Institute at Johns Hopkins University and a member of Fortify's Technical Advisory Board, will deliver the conference's keynote address.

About Fortify Software, Inc.

Fortify Software products protect companies from the threats posed by security flaws in business-critical software applications. Its flagship software security suites, Fortify Source Code Analysis and Fortify Security Tester, drive down costs and security risks by automating key processes of developing secure applications prior to deployment. Fortify Software is backed by leading investors, including Kleiner, Perkins, Caufield & Byers, and a world-class team of software security advisors and partners. More information is available at

Fortify Software, Inc.

CONTACT: Kim Milosevich of OutCast Communications, +1-415-392-8282, or
[email protected], for Fortify Software, Inc.

Web site:

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.