Recorded Webinars

Security Compass' recorded webinars with experts in Application Security.

  • How a Recruiter Thinks: Expert Tips on Finding a Job33:26

    How a Recruiter Thinks: Expert Tips on Finding a Job

    We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen

    Watch Video
  • Server-Side Request Forgery (SSRF): Defining a Hunt Methodology53:51

    Server-Side Request Forgery (SSRF): Defining a Hunt Methodology

    As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te

    Watch Video
  • The Intersection of Software Development and Privacy49:49

    The Intersection of Software Development and Privacy

    In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process

    Watch Video
  • Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory50:33

    Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory

    Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.

    Watch Video
  • The Business Value of Security in DevSecOps58:40

    The Business Value of Security in DevSecOps

    Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core

    Watch Video
  • Attacking & Defending Containers - Part 236:52

    Attacking & Defending Containers - Part 2

    Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline.

    Watch Video
  • Engaging Developers to Scale Threat Modeling36:11

    Engaging Developers to Scale Threat Modeling

    In this webinar, we will discuss an approach where we leverage the help of Engineering to significantly increase the coverage of threat modeling across an organization’s entire application portfolio.

    Watch Video
  • Attacking and Defending Containers – Part 136:39

    Attacking and Defending Containers – Part 1

    Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation.

    Watch Video
  • Delivering and scaling secure microservice-based products for any-cloud*0:00

    Delivering and scaling secure microservice-based products for any-cloud*

    Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. Watch this webinar to understand some microservice solutions!

    Watch Video
  • Addressing Business Risk in DevSecOps47:15

    Addressing Business Risk in DevSecOps

    Many times DevSecOps is thought of as an enabler for speed. But what if speed introduces unnecessary business risk? Is it still a valuable business investment? Is there a balanced approach that helps

    Watch Video
  • Enterprise Compliance with the California Consumer Privacy Act (CCPA)40:59

    Enterprise Compliance with the California Consumer Privacy Act (CCPA)

    In this webinar, learn some practical steps your organization can take to implement CCPA-compliant privacy notices and web applications.

    Watch Video
  • Global Impacts of the GDPR39:07

    Global Impacts of the GDPR

    Take a look back on how the GDPR has impacted businesses a year and a half on from its May 2018 implementation

    Watch Video
  • Continuously Monitor Your Architecture Security47:27

    Continuously Monitor Your Architecture Security

    Architecture security is a complex and often undervalued topic in most enterprises and in software products. It becomes even more challenging in scenarios involving continuous delivery and scalability

    Watch Video
  • Complying with Senate Bill 327- Using Frameworks and Tools to Build Security into IoT Devices46:24

    Complying with Senate Bill 327- Using Frameworks and Tools to Build Security into IoT Devices

    US Senate Bill 327 “Information privacy: connected devices” defines a new standard to address the security of connected devices. California was the first in the United States to pass a law that legisl

    Watch Video
  • Modernizing Risk Assessment to Support Your Business DevOps57:36

    Modernizing Risk Assessment to Support Your Business DevOps

    In this webinar, explore: - Challenges of traditional risk assessment - Frameworks for agile and automated risk assessment - Benefits of modernized risk assessment activities

    Watch Video
  • Automating the Discovery of Shadow IT to Ensure Compliance38:18

    Automating the Discovery of Shadow IT to Ensure Compliance

    Learn how you can get a handle on discovering and securing Shadow IT web applications through automation.

    Watch Video
  • loading
    Loading More...