Application Security Webinars

Discover Security Events in Application Security

Get Application Security Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Application Security: Current Status

Application Security remains a foundational pillar of cybersecurity as software applications continue to be primary targets for cyberattacks. With organizations developing and deploying applications at unprecedented speed through DevOps and cloud-native architectures, securing applications throughout their lifecycle has become increasingly complex and critical.

Shift-Left Security Movement

The industry has embraced the shift-left paradigm, integrating security earlier in the software development lifecycle rather than treating it as a final gate. DevSecOps practices incorporate automated security testing, code analysis, and vulnerability scanning into continuous integration and continuous deployment (CI/CD) pipelines. This approach enables developers to identify and remediate security issues during development, reducing costs and time-to-market while improving overall security posture.

Persistent Vulnerability Challenge

Despite advances in tooling and methodologies, common vulnerabilities persist. The OWASP Top 10 continues to highlight risks including injection flaws, broken authentication, security misconfigurations, and insecure deserialization. Supply chain attacks targeting application dependencies have increased dramatically, with malicious packages infiltrating software libraries and open-source repositories. Organizations struggle to manage vulnerabilities across complex application portfolios with multiple programming languages, frameworks, and dependencies.

Modern Application Security Approach

Contemporary application security strategies combine multiple techniques including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), and Software Composition Analysis (SCA). Organizations are adopting security champions programs, conducting regular security training for developers, and implementing comprehensive vulnerability management programs to address application security risks systematically.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

20th January 2026 | Tapping Into Trouble: The Hidden Dangers of Mobile App Proliferation

Mobile apps have become a high value target for attackers, and this session breaks down how real threats emerge when security is treated as optional or left to operating systems and app stores. The webinar examines how adversaries analyze and reverse engineer mobile applications, exploit weaknesses in client side logic and SDKs and use compromised devices to bypass identity checks, monetization flows and access sensitive data.

The discussion highlights why mobile apps now function as critical infrastructure and why older web centric security models leave gaps. Attendees will see practical defensive measures, including obfuscation, RASP, device attestation and threat monitoring, along with ways to use device intelligence to strengthen backend decisions and prevent fraud. The session is designed for teams that need a clearer view of modern mobile risks and how to defend against them.

Company_Webinar • Part of Guardsquare

_flag

21st January 2026 | Accelerating Secure Code: The Impact of AI-Powered Remediation

This webinar examines how AI powered code remediation is changing the way development teams address security flaws in modern software. The session outlines why security debt continues to grow, how manual repair slows delivery and where automated remediation can help teams reduce risk without sacrificing development speed.

Attendees will see how AI can identify and correct issues more efficiently, supported by real examples that show the impact on both security and productivity. The discussion highlights the key benefits for developers and security teams, offering a clear view of how automated remediation supports safer and faster software development.

Company_Webinar • Part of Veracode

_flag

17th December 2025 | Why code quality is a compliance accelerator

The webinar explains how strong code health works as the technical foundation for a compliant software environment. The session connects everyday development practices with broader compliance goals and shows why improving code quality has a direct impact on meeting regulatory and internal standards. Speakers will demonstrate how SonarQube automates key steps in the compliance journey by identifying issues early and supporting consistent, verifiable code practices.

Attendees will get a clear view of the difference between what a team builds and the underlying quality it is built on, along with practical examples of how healthier code leads to a more compliant codebase. The discussion also highlights how automation simplifies the process of proving compliance and makes it a natural outcome of well managed development workflows.

Company_Webinar • Part of Sonar

_flag

16th December 2025 | The Future of DAST

The discussion focuses on how dynamic application security testing must evolve as AI generated code accelerates development and widens the gap between speed and security. The session examines why traditional approaches struggle to keep pace and what a modern, production ready DAST strategy looks like as organizations move into 2026. Experts share practical insight into current market trends, customer experiences and the role unified AppSec platforms play in bringing context and prioritization to testing.

Attendees will hear why DAST is seeing renewed relevance in the AI era, how runtime security expectations are shifting and what tactics organizations are using to strengthen coverage without slowing development. The webinar offers guidance for teams building an updated application security strategy that matches today’s rapid release cycles.

Company_Webinar • Part of Checkmarx

_flag

16th December 2025 | The 2026 Guide to Securing AI-Generated Code at Scale

The webinar examines why AI generated code has quickly become a major security concern for engineering and AppSec teams and outlines what organizations must change as they move into 2026. James Berthoty and Boaz Barzel break down the risks that appear when AI driven development scales and explain how those risks can go unnoticed without the right policies and controls. The session gives a clear picture of the security gaps created by high velocity coding workflows powered by AI assistants.

Attendees will hear practical guidance on defining guardrails, managing Shadow AI and embedding modern application security checks directly into fast moving development pipelines. The speakers also show how AI powered security tools can analyze code, enforce policy and remediate issues at the pace development teams now operate. This webinar is built for CISOs, AppSec leaders and engineering managers who need structured frameworks to secure AI driven development without slowing innovation.

Company_Webinar • Part of OX Security

_flag