Security Compass' recorded webinars with experts in Application Security.
The Business Value of Security in DevSecOps
Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core
Attacking & Defending Containers - Part 2
Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline.
Engaging Developers to Scale Threat Modeling
In this webinar, we will discuss an approach where we leverage the help of Engineering to significantly increase the coverage of threat modeling across an organization’s entire application portfolio.
Attacking and Defending Containers – Part 1
Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation.
Delivering and scaling secure microservice-based products for any-cloud*
Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. Watch this webinar to understand some microservice solutions!
Addressing Business Risk in DevSecOps
Many times DevSecOps is thought of as an enabler for speed. But what if speed introduces unnecessary business risk? Is it still a valuable business investment? Is there a balanced approach that helps
Enterprise Compliance with the California Consumer Privacy Act (CCPA)
In this webinar, learn some practical steps your organization can take to implement CCPA-compliant privacy notices and web applications.
Global Impacts of the GDPR
Take a look back on how the GDPR has impacted businesses a year and a half on from its May 2018 implementation
Continuously Monitor Your Architecture Security
Architecture security is a complex and often undervalued topic in most enterprises and in software products. It becomes even more challenging in scenarios involving continuous delivery and scalability
Complying with Senate Bill 327- Using Frameworks and Tools to Build Security into IoT Devices
US Senate Bill 327 “Information privacy: connected devices” defines a new standard to address the security of connected devices. California was the first in the United States to pass a law that legisl
Modernizing Risk Assessment to Support Your Business DevOps
In this webinar, explore: - Challenges of traditional risk assessment - Frameworks for agile and automated risk assessment - Benefits of modernized risk assessment activities
Automating the Discovery of Shadow IT to Ensure Compliance
Learn how you can get a handle on discovering and securing Shadow IT web applications through automation.