[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”s” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_1 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”” animation=”none” width=”1/1″ last=”true”]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#00a4e0″ background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[blank h=”10″]
[/blank]
[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[column_2 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[column_2 width=”1/4″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_2]
[/column_1]
[blank h=”30″]
[/blank]
[/column]
[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”transparent” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/2″]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
ABOUT THE PROGRAM
Winning the AppSec DX Challenge will take place from 12pm to 2pm, beginning with open room networking followed by a 45-minute panel discussion over a three-course lunch at a 4-star restaurant in Toronto. The purpose of this event is to gather an invite-only group of 25 security and application leaders from major enterprises in the Greater Toronto Area to accomplish the following objectives:
ATTENDEE EXPERIENCE VIDEO
Please click the video below to view 40-second clip that demonstrates the attendee experience:
[/column_2]
[blank h=”30″]
[/blank]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#ededed” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/2″ last=”true”]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
ABOUT THE CONTENT
As organizations continue their digital transformation journey, their organizational borders have been eliminated by the cloud. While leading companies continue to leverage software to scale and improve their business, it’s important to remember that innovating with speed often comes at the expense of security.
[push h=5]
To keep pace with the rate of change and growing reliance on cloud infrastructure and applications, those who implement security best practices along the way will have a competitive advantage and be well equipped to keep up with the increasing speed of business.
[push h=30]
DISCUSSION TOPICS
[push h=15]
[/column_2]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#ededed” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
FEATURED PHOTOS FROM THIS EVENT
[modula id=”42921″]
[push h=10]
[/column_2]
[/column_1]
[/column]
[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#f8f8f8″ background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_1 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_1]
[blank h=”25″]
[/blank]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/5″]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
MODERATOR
[push h=10]
[/column_2]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
Chris Wysopal
Founder and CTO
Veracode
[push h=10]
[/column_2]
[/column_1]
[column_1 parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”false” extended_padding=”true” background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”” class=”” id=”” title=”” title_type=”single” animation=”none” width=”4/5″ last=”true”]
[column_2 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
PANELISTS
[push h=10]
[/column_2]
[column_2 width=”1/5″ title=”” title_type=”single” animation=”none” implicit=”true”]
Darlene Mielke
Director, Vulnerability Management Group
RBC
[push h=10]
[/column_2]
[column_2 width=”1/5″ title=”” title_type=”single” animation=”none” implicit=”true”]
Joe Leonard
Consultant, CISO Evangelist
Veracode
[push h=10]
[/column_2]
[column_2 width=”1/5″ title=”” title_type=”single” animation=”none” implicit=”true”]
Olivera Zatezalo
Chief Security Officer
Huawei Technologies
[push h=10]
[/column_2]
[column_2 width=”1/5″ title=”” title_type=”single” animation=”none” implicit=”true”]
Craig Newell
Director, Cyber Security
LCBO
[push h=10]
[/column_2]
[column_2 width=”1/5″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
Prasenjit Saha
Executive Vice President, Global Head – Cyber Security
LTI
[push h=10]
[/column_2]
[/column_1]
[blank h=”10″]
[/blank]
[/column]
[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”true” extended_padding=”true” background_color=”#00a4e0″ background_image=”https://bdionline.com/wp-content/uploads/2017/06/RSVP-Opaque-Medium.png” background_repeat=”no-repeat” background_position=”center center” background_size=”auto” background_attachment=”fixed” hide_bg_lowres=”false” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[column_1 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
[/column_1]
[blank h=”30″]
[/blank]
[column_1 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
If you have received an invitation and would like to RSVP, or if you would like additional information and to be considered for participation, please email Steven Etzler at steven.etzler@bdionline.com. While there is no cost to participate, we require registrants to show up and actively contribute to the conversation.
[push h=20]
[/column_1]
[column_1 width=”1/4″ title=”” title_type=”single” animation=”none” implicit=”true”]
DATE
Wednesday, December 11th, 2019
TIME
12:00 PM – 2:00 PM
LOCATION
Leña
176 Yonge Street,
Toronto, ON M5C 2L7 Canada
[/column_1]
[column_1 width=”1/3″ title=”” title_type=”single” animation=”none” implicit=”true”]
ATTENDEE PROFILE
25 security and application leaders from major enterprises
[button id=”” style=”border” class=”” align=”left” link=”mailto:steven.etzler@bdionline.com?subject=RSVP for the 12/11 AppSec DX Challenge Lunch Event in Toronto” linkTarget=”_self” bgColor=”accent1″ hover_color=”accent1″ font=”20″ icon=”” icon_placement=”left” icon_color=””]RSVP NOW[/button]
[/column_1]
[column_1 width=”2/5″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
EVENT AGENDA:
12:00 PM – 12:30 PM | Reception, Meet & Greet |
12:30 PM – 12:40 PM | Welcome Remarks and Lunch Begins |
12:40 PM – 1:45 PM | Panel Discussion and Q&A with Attendees |
1:45 PM – 2:00 PM | Interactive Roundtable Discussion |
[/column_1]
[blank h=”15″]
[/blank]
[/column]
[column parallax_bg=”disabled” parallax_bg_inertia=”-0.2″ extended=”” extended_padding=”1″ background_color=”” background_image=”” background_repeat=”” background_position=”” background_size=”auto” background_attachment=”” hide_bg_lowres=”” background_video=”” vertical_padding_top=”0″ vertical_padding_bottom=”0″ more_link=”” more_text=”” left_border=”#FFFFFF” class=”” id=”” title=”” title_type=”single” animation=”none” width=”1/1″ last=”true”]
[blank h=”75″]
[/blank]
[column_1 width=”1/1″ last=”true” title=”” title_type=”single” animation=”none” implicit=”true”]
Veracode gives companies a comprehensive and accurate view of software security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world. [push h=5] With its combination of automation, integrations, process, and speed, Veracode helps companies make security a seamless part of the development process. This allows them to both find and fix security defects so that they can use software to achieve their missions. [push h=5] Veracode serves more than 2,000 customers worldwide across a wide range of industries. The Veracode Platform has assessed more than 8 trillion lines of code and helped companies fix more than 36 million security flaws. Learn more at www.veracode.com, on the Veracode blog and on Twitter. |
[push h=45]
ORGANIZER
[push h=5]
Business Development Institute (BDI) is an award-winning event marketing agency specializing in producing invitation-only, thought leadership driven, custom events on the most impactful topics. BDI’s programs create an interactive peer learning experience while providing a rare networking opportunity for like-minded leaders over a fine lunch. |
[/column_1]
[/column]