QA&TEST Embedded Online

28, 29 y 30 de Octubre

Programa

28

de Octubre / Miércoles

29

de Octubre / Jueves

30

de Octubre / Viernes

30

de Octubre / Viernes

KEYNOTE

09:00-10:00

How Design Superpowers will Save our Planet

Tapani Jokinen

10:00-10:30
Coffee Break y debate
TRACK 3: Security Management
FORMACIÓN 3

10:30-11:15

What is a security vulnerability?
Koen Yskout
imec-DistriNet, KU Leuven (Bélgica)

11:15-12:00

Moving from DevOops to DevSecOps – Practical integration of Security-by-Design
Edward van Deursen
Securesult B.V. (Países Bajos)

12:00-12:45

12:45-13:30

Debate

10:30-11:15

What is a security vulnerability?
Koen Yskout
imec-DistriNet, KU Leuven (Bélgica)

11:15-12:00

Moving from DevOops to DevSecOps – Practical integration of Security-by-Design
Edward van Deursen
Securesult B.V. (Países Bajos)

12:00-12:45

API Testing in DevSecOps pipelines
René Außerehl
bdosecurity (Alemania)

12:45-13:30

Debate

10:30-13:30

How to design and execute efficient load, stress and performance testing processes (2/3)

FORMACIÓN 3

10:30-13:30

How to design and execute efficient load, stress and performance testing processes (2/3)

TRACK 4: Security Testing
FORMACIÓN 4

15:00-15:45

Proximity cards under the magnifying glass
Kamil Medzikowski
Intel (Polonia)

15:45-16:30

Threats and Security for Embedded Devices
Lennert Wouters
KU Leuven (Bélgica)

16:30-17:15

17:15-18:00

Debate

15:00-15:45

Proximity cards under the magnifying glass
Kamil Medzikowski
Intel (Polonia)

15:45-16:30

Threats and Security for Embedded Devices
Lennert Wouters
KU Leuven (Bélgica)

16:30-17:15

17:15-18:00

Debate

15:00-18:00

Specification by example: from user requirements to test cases (2/3)

FORMACIÓN 4

15:00-18:00

Specification by example: from user requirements to test cases (2/3)