Building Security from Within: Empowering Software Teams for Resilience

Security Innovation's Ed Adams on Taking Awareness Training to New Level
Ed Adams, CEO, Security Innovation

Increasingly, threat actors are targeting software developers and their code, finding new ways to attack enterprises from within. A new level of security awareness is needed, says Ed Adams, CEO of Security Innovation. And it needs to focus squarely on building cyber resilience.

In this video interview with Information Security Media Group, previewing an upcoming webinar entitled Techniques for Building Cyber Resiliency in Your Software, Adams discussed:

  • How threat actors are targeting developers and software;
  • Why these targets are inherently vulnerable;
  • The new level of security awareness training required to build resilience.

Adams is a software quality and security expert with 20+ years of industry experience. He has been CEO of Security Innovation since 2003. A Ponemon Institute Research Fellow, Adams was named a Privacy by Design Ambassador by the Information & Privacy Commissioner of Canada and has received multiple SC Magazine Reboot Leadership Awards. Prior to Security Innovation, Adams held senior management positions at Rational Software, Lionbridge, Ipswitch, and MathSoft and was an engineer for the US Army and Foster-Miller early in his career. Adams has presented at hundreds of industry events and conferences, and is the host of EdTALKS, a monthly panel that debates risk-based approaches to securing software, and recently authored See Yourself in Cyber – Security Careers Beyond Hacking.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.