{"id":790,"date":"2015-09-25T17:48:45","date_gmt":"2015-09-26T00:48:45","guid":{"rendered":"https:\/\/blogs.plm.automation.siemens.com\/t5\/Polarion-Blog\/Join-Polarion-Software-at-In-Person-Software-Security-Event\/ba-p\/380999"},"modified":"2026-03-26T05:31:05","modified_gmt":"2026-03-26T09:31:05","slug":"join-polarion-software-at-in-person-software-security-event","status":"publish","type":"post","link":"https:\/\/blogs.sw.siemens.com\/polarion\/join-polarion-software-at-in-person-software-security-event\/","title":{"rendered":"Join Polarion Software at In-Person Software Security Event"},"content":{"rendered":"<p><CENTER><A href=\"http:\/\/community.plm.automation.siemens.com\/legacyfs\/online\/siemensplm_blogs\/2015\/09\/Event-banner.jpg\" rel=\"nofollow noopener noreferrer\"><IMG class=\"aligncenter size-full wp-image-7850\" src=\"http:\/\/community.plm.automation.siemens.com\/legacyfs\/online\/siemensplm_blogs\/2015\/09\/Event-banner.jpg\" alt=\"\" width=\"600\" height=\"170\" \/><\/A><\/CENTER><br \/>\nIf you\u2019re in the San Francisco Bay Area, <STRONG>Polarion Software<\/STRONG> would like to invite you to an in-person software security event next week. The event will take place on Tuesday, September 29 at the <a href=\"http:\/\/www.starwoodhotels.com\/sheraton\/property\/overview\/index.html?propertyID=214&amp;language=en_US\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Sheraton Palo Alto Hotel<\/A>.<\/p>\n<p>Polarion Software will have automotive product manager Mike Borse speaking at the event, as he joins other panelists to discuss threat modeling and applied security architecture in agile software development. This will be a great opportunity to interact with leading security industry experts regarding the complex topic of agile software development.<!--more--><\/p>\n<p>Renowned authors James Ransome and Brook Schoenfield will also be present, alongside security experts from Rogue Wave Software, Polarion Software, and Security Innovation. The seminar focus will be: True security compliance, best practices for identifying flaws, and personalized security assessment and planning.<\/p>\n<p>Attendees will have the opportunity to network with security experts and receive a free personalized security assessment that can be implemented at your organization. In addition, a security guide will be distributed so you have the necessary tools to take a look at your organization\u2019s software development cycle.<\/p>\n<p><CENTER><A href=\"http:\/\/www.roguewave.com\/events\/in-person-events\/expert-panel-security-at-the-source\" rel=\"nofollow noopener noreferrer\"><IMG class=\"aligncenter size-full wp-image-7857\" src=\"http:\/\/community.plm.automation.siemens.com\/legacyfs\/online\/siemensplm_blogs\/2015\/09\/REGISTER-NOW.png\" alt=\"\" width=\"250\" height=\"63\" \/><\/A><\/CENTER>Event schedule:<br \/>\n<UL><br \/>\n\t<LI><EM>1:00pm-1:15pm: Panel member introductions<\/EM><\/LI><br \/>\n\t<LI><EM>1:15pm-1:45pm: Exercise: What challenges are you currently facing in your organization?<\/EM><\/LI><br \/>\n\t<LI><EM>1:45pm-3:00pm: <STRONG>Threat modeling and applied security architecture in Agile software development<\/STRONG> with Intel experts James Ransome and Brook Schoenfield<\/EM><\/LI><br \/>\n\t<LI><EM>3:00pm-3:30pm: <STRONG>Bug detection<\/STRONG> with Qualcomm experts Murali Somanchy and Brian Rosenberg<\/EM><\/LI><br \/>\n\t<LI><EM>3:30pm-4:00pm: Break with appetizers and cocktails<\/EM><\/LI><br \/>\n\t<LI><EM>4:00pm-5:00pm: Panel session with security experts<br \/>\n<\/EM><\/LI><br \/>\n<\/UL><br \/>\nThe event costs $100 to attend.<\/p>\n<p>If you\u2019re one of the first 10 attendees to check-in, expect a free copy of Core Software Security: Security at the Source and Securing Systems: Applied Security Architecture and Threat Models.<\/p>\n<p>Look forward to seeing you there!<\/p>\n<p><EM>Polarion would enjoy interacting with you before, during, and after the event. So, tweet&nbsp;<a href=\"http:\/\/t.hsms02.com\/e1t\/c\/*W8XQHDp6xTPLDVBp2tX3bcTFx0\/*N2lLZTdbFWFMW397F918zr6Rd0\/5\/f18dQhb0Sq5G8YXMXYW95MK5Z2qwv1yW1h4wkX321YnpMf5b0xXD6prW7cmS1s1nNNN3W1njGYF7nwMJHW2q9xqt6cbbYkW6bHhN790G7thN8S3yR5bY02SW4s87qY1CdwPPW7_DKfQ6256g1W5tHwk72yRl1QW95lj2n4jnkkcN2yJF1WYT2jkW6P4lCX6hFc9LW69NG1w6Pr5q2W4MW8X34r1Pm7W1nq9tG18T0S-W1VJryk5lX8fqW13bD4h6dklZwMtypq3vKNpMW1BjQ771jDnBbN77lfFb6blmXW4yySVH3nxDLBW7qTZSN84zDLhW2QYXK-5305p0W4bVQWV3mDh4DW4hkppF4cV39NW1jyTZc8VHzSSV6wM_f5-zKXTW2RrZT24zmkMDW2Lkppm1g8lHFN82pQvn7HkgdW2fzV9C7t1BlkMy9d1KPFPMtW893BMy73R1h2W224lgh1ppLLwW1hrCyX1L0lRfW1Gcz755VXnPmN6tyrBXyMBX0VsjV005XTp66W7znPKQ7mQ4YrVXn6992S7KLFN978tw0HGky5W5LKBX14L1MlSW4HzlYJ99LcjL111\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Rogue Wave<\/A>&nbsp;or&nbsp;<a href=\"http:\/\/t.hsms02.com\/e1t\/c\/*W8XQHDp6xTPLDVBp2tX3bcTFx0\/*W2wzvV02S1mlwW5QTyTd6mYx9Y0\/5\/f18dQhb0Sq5G8YHrG2W95MK5Z2qwv1yW1h4wkX321YnpMf5b0xXD6prW7cmS1s1nNNN3W1njGYF7nwMJHV3WgLL2ykPfQW4DXyR190G7thN8S3yR5bY02SW4s7-4N8y0fxgW8f06cV7_DKfQW6256g15tHwk7W2yRl1Q95lj2nW5twQr72yJF1WVYT2jk6P4lCXW6hF7H569NG1wW6Pr5qt4NwcCJW96dt4S4r1QvYW5M11-18gjY6LW8WBKbV56sy_8W2NhXH15pH0lKW8VSTKL8TvN0VW6xSpJk82yb9KW6xh6zT2RF_r-W76Sf6Z5MLB0KW1FbD0C2RpPFWW49wjS76gxCGPW4fx9Fc8hDPL9W4zyh3-9cfhHrW5-_nmD1VcCF7W6X_7b21g2Kj3W2Qx50N6wHN6_W2frbSh1TcLwnN8WNS_ZtLx38W55x4262nmG_QW6BkljC3FTs3TW8csLSq112nkBW5pf4325kgLKGW5y35SR5w8KwfW2XSLkX2ykt3lW456qYd5mRgWyW3fwRsz6qLzTYW6j5qNY1P9W6gW82Tzzm43pJjxW8YpK3Y702t6-DZpcdjmm1Gf5qSQT803\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Polarion<\/A>&nbsp;directly using #RWPaloAlto on Twitter.<\/EM><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re in the San Francisco Bay Area, Polarion Software would like to invite you to an in-person software security event next week. The event will take place on Tuesday, September 29 at the Sherat&#8230;<\/p>\n","protected":false},"author":46623,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spanish_translation":"","french_translation":"","german_translation":"","italian_translation":"","polish_translation":"","japanese_translation":"","chinese_translation":"","footnotes":""},"categories":[1],"tags":[],"industry":[],"product":[],"coauthors":[],"class_list":["post-790","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/posts\/790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/users\/46623"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/comments?post=790"}],"version-history":[{"count":1,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/posts\/790\/revisions"}],"predecessor-version":[{"id":791,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/posts\/790\/revisions\/791"}],"wp:attachment":[{"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/media?parent=790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/categories?post=790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/tags?post=790"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/industry?post=790"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/product?post=790"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/polarion\/wp-json\/wp\/v2\/coauthors?post=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}