Thursday, June 5, 2025 at 2 PM EDT
The craft of software engineering, and thus the organizational risk that accompanies building applications, is always evolving. From mainframes to web and mobile, waterfall to agile, monoliths to microservices, bare-metal to DevOps and cloud, the past several years have seen massive disruptions to the ways software is developed, and the security tools and processes needed to manage emerging threats have often lagged behind.
We are now in the midst of another generational shift in the way applications are created; this time away from human-centered software development and toward a new world of machine-generated code, large language models, prompt engineering, and AI agents writing and managing software autonomously. This new landscape includes an entirely novel set of attack vectors that the application security practices of yesterday are not equipped to handle.
Just as the methodology of DevSecOps evolved to manage the new risks of DevOps-oriented software practice, a new framework is needed to identify, prioritize, remediate and manage the new classes of vulnerabilities being introduced rapidly into AI-native applications.
Join Snyk, the leader in Developer Security and AI Trust, as we…
Speakers:
Clinton Herget, Field CTO, Snyk
Clinton Herget is Field CTO at Snyk, the leader in Developer Security, where he focuses on crafting and evangelizing our strategic vision for the evolution of DevSecOps. A seasoned technologist, Clinton spent his 20-year career prior to Snyk as a web software developer, DevOps consultant, cloud solutions architect, and engineering director. Clinton is passionate about empowering software engineers to do their best work in the chaotic cloud-native world, and is a frequent conference speaker, developer advocate, and technical thought leader.
Moderator:
Terry Sweeney, Contributing Editor, Black Hat
Offered Free by: Snyk
See All Resources from: Snyk
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.