Recorded Webinars

Security Compass' recorded webinars with experts in Application Security.

  • The Business Value of Security in DevSecOps58:40

    The Business Value of Security in DevSecOps

    Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core

    Watch Video
  • Attacking & Defending Containers - Part 236:52

    Attacking & Defending Containers - Part 2

    Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline.

    Watch Video
  • Engaging Developers to Scale Threat Modeling36:11

    Engaging Developers to Scale Threat Modeling

    In this webinar, we will discuss an approach where we leverage the help of Engineering to significantly increase the coverage of threat modeling across an organization’s entire application portfolio.

    Watch Video
  • Attacking and Defending Containers – Part 136:39

    Attacking and Defending Containers – Part 1

    Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation.

    Watch Video
  • Delivering and scaling secure microservice-based products for any-cloud*0:00

    Delivering and scaling secure microservice-based products for any-cloud*

    Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. Watch this webinar to understand some microservice solutions!

    Watch Video
  • Addressing Business Risk in DevSecOps47:15

    Addressing Business Risk in DevSecOps

    Many times DevSecOps is thought of as an enabler for speed. But what if speed introduces unnecessary business risk? Is it still a valuable business investment? Is there a balanced approach that helps

    Watch Video
  • Enterprise Compliance with the California Consumer Privacy Act (CCPA)40:59

    Enterprise Compliance with the California Consumer Privacy Act (CCPA)

    In this webinar, learn some practical steps your organization can take to implement CCPA-compliant privacy notices and web applications.

    Watch Video
  • Global Impacts of the GDPR39:07

    Global Impacts of the GDPR

    Take a look back on how the GDPR has impacted businesses a year and a half on from its May 2018 implementation

    Watch Video
  • Continuously Monitor Your Architecture Security47:27

    Continuously Monitor Your Architecture Security

    Architecture security is a complex and often undervalued topic in most enterprises and in software products. It becomes even more challenging in scenarios involving continuous delivery and scalability

    Watch Video
  • Complying with Senate Bill 327- Using Frameworks and Tools to Build Security into IoT Devices46:24

    Complying with Senate Bill 327- Using Frameworks and Tools to Build Security into IoT Devices

    US Senate Bill 327 “Information privacy: connected devices” defines a new standard to address the security of connected devices. California was the first in the United States to pass a law that legisl

    Watch Video
  • Modernizing Risk Assessment to Support Your Business DevOps57:36

    Modernizing Risk Assessment to Support Your Business DevOps

    In this webinar, explore: - Challenges of traditional risk assessment - Frameworks for agile and automated risk assessment - Benefits of modernized risk assessment activities

    Watch Video
  • Automating the Discovery of Shadow IT to Ensure Compliance38:18

    Automating the Discovery of Shadow IT to Ensure Compliance

    Learn how you can get a handle on discovering and securing Shadow IT web applications through automation.

    Watch Video
  • loading
    Loading More...