ON-DEMAND WEBINAR: Hidden Requirements in the Telecoms Security Act (TSA)

 

Watch the on demand recording! 

 

Under the TSA, within the Code of Practice specifically, there is hidden a number of requirements and measures that large telecoms providers must legally comply with in order to ensure the security of their applications. For example, Section 6.28 of the Code of Practice specifically singles out ‘poor software development processes’, while Measure M10.42 requires software subcomponents be contractually supported. With the sheer scale and impact of all of the technical and governance requirements, the security of software development and lifecycle management is often undervalued or least considered.

 

This webinar looks at the TSA, ECR and Code of Practice from a software development lifecycle perspective, including the software supply chain, and focuses on the specific requirements and measures that providers must take to protect what is often considered as the soft underbelly of a robust secure posture.

 

Fill out the form on the right to watch the session! 

Watch Now:

“Legit is providing us with visibility across the entire software supply chain, which helps us minimize risk and raise analyst and engineering productivity”

testimonial-logo
Deputy Chief Information Security Officer
Netscope

“Legit significantly helps organizations to modernize application security programs by seamlessly integrating security into agile development and our modern application stack."

cboe-testimonial
Global CISO
Chicago Board of Options Exchange (CBOE)

“Legit helps us secure our CI/CD pipelines including tracking the security posture of different teams, addressing SDLC configuration drifts, and applying security resources where it can help us most."

acv-testimonial
VP of Security
ACV Auctions

"We’re able to inventory all our SDLC systems and security tools, view developer activity, and leverage this visibility and context to remediate vulnerabilities faster."

takeda-testimonial
Head of DevSecOps
Takeda Pharmaceutical Company

“Legit gives us governance out of the box, and the ability to have visualization across our SDLC to improve our developer collaboration and security best practices.”

google-mandient-testimonial
Chief Information Security Officer
Google/Mandiant

Value Delivered Fast

Onboard in Minutes

No agents to install. Securely leverages APIs and access tokens

One Platform, All Resources

SaaS, private cloud and on-premise
deployment options

Your Tools and Workflows

No changes required to any of them

Book a free consultation today. You’ll see how Legit can:
  • Find everything impacting your AppSec posture through a unified view of all application risk – from code to cloud.
  • Fix the issues that create the most business risk with deep context to prioritize and action remediation.
  • Prevent future risk by automating the time-intensive, manual processes associated with triage and remediation.
In addition, as you build your AppSec program, we can help you:
  • Map and visualize your entire software supply chain.
  • Optimize your vulnerability management processes.
  • Align your program with key compliance standards and frameworks.
  • Implement advanced secrets detection and prevention.
  • Identify use of GenAI in your development.