BEGIN:VCALENDAR
PRODID:-//github.com/ical-org/ical.net//NONSGML ical.net 5.1.4//EN
VERSION:2.0
BEGIN:VEVENT
DESCRIPTION:Firewalls\, anti-viruses\, and intrusion detection systems are 
 everywhere — but they often come too late. By the time security teams re
 act\, vulnerabilities have already been designed into the software itself.
 \n\nIn this thought-provoking session\, we’ll uncover the silent\, invis
 ible firewall that most organizations overlook: Secure Requirements Engine
 ering (SRE).\n\nYou’ll discover why cybersecurity failures often begin w
 ith poorly defined or missing security requirements\, and how proactive\, 
 well-engineered requirements can prevent entire classes of vulnerabilities
  before a single line of code is written.\n\nWe’ll also explore how the 
 IIBA Cybersecurity Analysis (CCA) certification empowers professionals to 
 bridge the critical gap between business\, software engineering\, and cybe
 rsecurity — making requirements your first and strongest line of defense
 .\n\nThis talk will challenge your assumptions\, introduce practical metho
 ds\, and offer a new perspective on building security into software from t
 he ground up.
DTEND:20250804T180000Z
DTSTAMP:20260416T020145Z
DTSTART:20250804T170000Z
SEQUENCE:1
SUMMARY:Shift Left .. to Shield Right - The Silent Defender you Overlooked!
  - VIRTUAL
UID:1060af1c-2a23-4e42-b2ef-8f410046ef59
X-ALT-DESC;FMTTYPE=text/html:Firewalls\, anti-viruses\, and intrusion detec
 tion systems are everywhere — but they often come too late. By the time 
 security teams react\, vulnerabilities have already been designed into the
  software itself.\n\nIn this thought-provoking session\, we’ll uncover t
 he silent\, invisible firewall that most organizations overlook: Secure Re
 quirements Engineering (SRE).\n\nYou’ll discover why cybersecurity failu
 res often begin with poorly defined or missing security requirements\, and
  how proactive\, well-engineered requirements can prevent entire classes o
 f vulnerabilities before a single line of code is written.\n\nWe’ll also
  explore how the IIBA Cybersecurity Analysis (CCA) certification empowers 
 professionals to bridge the critical gap between business\, software engin
 eering\, and cybersecurity — making requirements your first and stronges
 t line of defense.\n\nThis talk will challenge your assumptions\, introduc
 e practical methods\, and offer a new perspective on building security int
 o software from the ground up.
END:VEVENT
END:VCALENDAR
