Synopsys, Inc. today announced it will host the 8th annual CodenomiCON USA and showcase its Software Integrity Platform at Black Hat USA 2016. CodenomiCON is an exclusive cybersecurity thought leadership and networking event organized by Synopsys during Black Hat USA, one of the largest and most distinguished information security conferences in the world.
CodenomiCON brings together some of the brightest minds in cybersecurity the evening before the Black Hat Business Hall commences to network, discuss the evolving threat landscape, and explore proactive solutions to secure our connected world. CodenomiCON features presentations and panel discussions from renowned security researchers like Dr. Charlie Miller, Chris Valasek and Billy Rios, as well as thought leaders and practitioners from the public and private sectors.
WHEN AND WHERE:
CodenomiCON USA 2016 will take place at the House of Blues at Mandalay Bay Resort and Casino, Las Vegas, on Tuesday, August 2 from 5:00 p.m. to 10:00 p.m. Synopsys will be showcasing its Software Integrity Platform and delivering presentations at booth #960 in the Black Hat Business Hall on Wednesday, August 3 and Thursday, August 4.
Complimentary food and drinks will be served throughout the evening. Space is limited and registration is required.
SYNOPSYS AT BLACK HAT
In addition, visit Synopsys in the Black Hat Business Hall on Wednesday, August 3 and Thursday, August 4 at booth #960 for daily presentations and product demonstrations featuring the recently released Coverity® 8.5 static analysis tool and the Seeker® 3.8 runtime security analysis tool.
About the Synopsys Software Integrity Platform
Through its Software Integrity Platform, Synopsys provides advanced solutions for improving software quality and security. This comprehensive platform of automated analysis and testing technologies integrates seamlessly into the software development process and enables organizations to detect and remediate quality defects, security vulnerabilities and compliance issues early in the software development lifecycle, as well as to gain security assurance with and visibility into their software supply chain.