Chris PrevostVice President of Solutions
Chris Prevost has more than 20 years of experience helping technology companies accelerate the time-to-value for their customers. He is responsible for Prevoty’s global solutions organization. Previously, Prevost led the solutions team at Metanautix, a Sequoia-funded big data analytics startup. At Hewlett-Packard, he led the global solutions architecture organization for the application security business unit. Before that, he built the pre-sales engineering team at Fortify, earning the business's first 1,000 enterprise customers. Prevost holds a Bachelor of Science in electrical engineering from California Polytechnic State University, San Luis Obispo, where he also rowed and coached the crew team.
Knowing is half the battle when it comes to protecting applications and their sensitive data.
Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality — not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol.
This session will review real-life case studies about enterprises that are adopting a savvy, new approach to protecting sensitive data and mitigating threats real-time. Explore available game-changing tools that are placed at the front of the line—directly in the application’s operating environment—to immediately lower risk and act as a compensating control at runtime.
In the case studies, explore ways to improve forensics, see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Through a demonstration observe live production attacks and generation of real-time security event logs and reports. Security teams can then correlate pre-production vulnerability scan results with runtime attack logs to go back, remediate based on actual risk—not just hypothetical threats. The result? Improved forensics.