Most Recent Videos
View our panel discussion as we discuss how threat modeling is evolving into a multi-stakeholder activity that suggests mitigations on an ongoing basis to drive down risk for critical business assets.
Scale your threat modeling processes and identify threats at a much faster rate than traditional methods. Watch this video to learn more.
Shift left to build software securely and ensure compliance with standards, such as NIST RMF. Learn how you can achieve ATO faster.
Join us as we discuss how to successfully integrate firmware and software security into a system delivery model that produces secure systems and products.
This webinar will introduce you to the concept of continuous authorization and indicate how to achieve it.
DevSecOps Days Toronto 2021, Hosted by Security Compass.
Security and risk practitioners play a key role in cloud adoption that enables business agility. Security engineers must see that all deployment artifacts conform to the unique attributes of cloud inf
Security and risk practitioners play a key role in cloud adoption that enables business agility.
Balanced Development Automation enables you to build secure digital products without compromising time to market. Learn how it can work for your organization
Continuous ATO is an attempt at trying to build security into the software lifecycle from the beginning rather than trying to add it at the end, accepting ongoing security risk.