Recorded Webinars

This stream includes recorded webinars from Security Compass.

  • Global Impacts of the GDPR39:07

    Global Impacts of the GDPR

    The General Data Protection Regulation (GDPR) is a comprehensive data protection and privacy law that applies to all organizations that collect, use, or share personal data in the EU, and to organizat

    Watch Video
  • Continuously Monitor Your Architecture Security47:27

    Continuously Monitor Your Architecture Security

    Architecture security is a complex and often undervalued topic in most enterprises and in software products. It becomes even more challenging in scenarios involving continuous delivery and scalability

    Watch Video
  • Complying with Senate Bill 327: Using Frameworks and Tools to Build Security into IoT Devices46:25

    Complying with Senate Bill 327: Using Frameworks and Tools to Build Security into IoT Devices

    US Senate Bill 327 “Information privacy: connected devices” defines a new standard to address the security of connected devices. California was the first in the United States to pass a law that legisl

    Watch Video
  • Modernizing Risk Assessment to Support Your Business’ DevOps57:36

    Modernizing Risk Assessment to Support Your Business’ DevOps

    With agile & DevOps initiatives taking place in many organizations today, risk assessment processes need to be modernized in order to support the business in managing security risk in a timely, effici

    Watch Video
  • Automating the Discovery of Shadow IT to Ensure Compliance38:19

    Automating the Discovery of Shadow IT to Ensure Compliance

    Join Jeremiah Grossman, Founder & CEO of Bit Discovery, and Rohit Sethi, COO at Security Compass, to discuss Shadow IT, one of the most pressing operational challenges today. Learn how you can get a h

    Watch Video
  • Webinar: Secure Application Development from Policy to Procedure50:21

    Webinar: Secure Application Development from Policy to Procedure

    Join Rohit Sethi, COO at Security Compass, and Jeffrey Cohen, Director of Software Security at TD Ameritrade, for a 60-min webinar where we examine the policy-to-execution gap and discuss how organiza

    Watch Video
  • Webinar: Overcoming DevSecOps Challenges58:59

    Webinar: Overcoming DevSecOps Challenges

    A 60-min webinar to learn about DevSecOps challenges and how to respond effectively. Historically, a lot of discussion in software security has been focused at the project level - emphasized code sca

    Watch Video
  • Webinar: Learn how to comply with PCI’s new Software Security Framework36:39

    Webinar: Learn how to comply with PCI’s new Software Security Framework

    As prescribed by the new PCI Software Security Framework, learn how to transform policy into actionable tasks for compliance. Speaker: Rohit Sethi (COO, Security Compass) We cover: - An overview of

    Watch Video
  • Webinar: Scaling Your Cybersecurity Threat Modeling57:12

    Webinar: Scaling Your Cybersecurity Threat Modeling

    Learn how the scalability problems of a traditional threat modeling framework can be better managed by introducing systems, data, and people components. From this, one can derive a repeatable and audi

    Watch Video
  • Webinar: From DevOps to DevSecOps: It's about building an effective program level strategy.54:01

    Webinar: From DevOps to DevSecOps: It's about building an effective program level strategy.

    When discussing DevSecOps, we need to align DevOps, Compliance, Audit, and Business teams. Program level thinking is required to drive DevSecOps. This means discussing future state competencies, gover

    Watch Video
  • MISTI Webcast: Beyond OWASP Top 10 Vulnerabilities41:49

    MISTI Webcast: Beyond OWASP Top 10 Vulnerabilities

    Recorded live as part of MISTI eSummit

    Watch Video
  • Webinar: Managing Application Security43:42

    Webinar: Managing Application Security

    Presented by Rohit Sethi, Chief Operating Officer. Security Compass recently completed a research study by surveying companies across multiple industries with the goal of discovering how large, com

    Watch Video
  • Webinar: Build Secure Applications with IBM AppScan and SD Elements Integration48:50

    Webinar: Build Secure Applications with IBM AppScan and SD Elements Integration

    Now more than ever, development teams need to think about eliminating security vulnerabilities throughout their entire development lifecycle to ensure that the final product is secure by design. Unfor

    Watch Video
  • How Adobe Uses SD Elements12:39

    How Adobe Uses SD Elements

    Presented by Jim Hong

    Watch Video
  • ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Management45:13

    ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Management

    Effective application security programs both highlight security requirements early in the development process and manage vulnerabilities throughout the development lifecycle. This webinar demonstrates

    Watch Video
  • loading
    Loading More...