In this week’s webinars, we’ll talk about how to add static analysis to your development cycle and how to minimize open source risk in M&A transactions.
Implementing SAST Into Your SDLC: What to Look For and What to Consider
So you’ve decided (or been told) that you need to implement SAST in your software development process. This webinar will cover some of the things you should consider when looking for a solution and how to implement it. SAST is not a one size fits all solution and implementation can often be a compromise between technology, time, process and people. Especially the people.
We will cover what you should look for in a tool, considerations about implementations and the importance of process in making sure that you get a good return on your investment and of course high quality and more secure software. We will look at common objections and pitfalls that occur during this type of project.
When: Wednesday, July 22 @ 10 a.m. CEST
Who: Rob Haines, Senior Sales Engineer, Synopsys
Crafting Reps and Warranties to Reduce Open Source Risk in M&A Transactions
Synopsys is an active acquirer with more than 80 deals over the last 33 years. In addition to having a thorough tech due diligence process, we structure our M&A agreements to minimizing license, security, and code quality risks in the software we’re acquiring. We’re offering a peek at our approach.
Join us for this live webinar as we talk through how to minimize risk and maximize value with every transaction. We’ll cover:
- The use of open source in targets’ offerings
- Ensuring intellectual property value
- Protecting against known vulnerabilities in open source components
- Other elements of security and code quality
- How software audits help inform reps and warranties
Don’t miss this informational webinar. Register today.
When: Thursday, July 23 @ 2 p.m. Eastern / 11 a.m. Pacific
Who: Danny Ogburn, Synopsys; Matt Jacobs, Synopsys
*** This is a Security Bloggers Network syndicated blog from Software Integrity Blog authored by Synopsys Editorial Team. Read the original post at: https://www.synopsys.com/blogs/software-security/webinars-july-20-24/