Most Recent Videos
Balanced Development Automation enables you to build secure digital products without compromising time to market. Learn how it can work for your organization
Continuous ATO is an attempt at trying to build security into the software lifecycle from the beginning rather than trying to add it at the end, accepting ongoing security risk.
We discuss with an expert panel, the benefits of a security culture, the attributes of a security culture, and building a security culture with clear intentions.
Learn how to use Enterprise Architecture as a framework for achieving this balance. Ultimately, value creation is unique to each organization.
In this webinar, we will examine how security can be an enabler for lean software development.
This webinar will walk through the science of e-learning and discuss how to think about designing an effective program that delivers measurable business value.
Approaching creation and deployment of security controls from different stakeholder perspectives. Diverse perspectives will help you avoid pitfalls when implementing security controls in DevSecOps
We talk about the nuances of 5G as well as introduce you to security and privacy concerns with this emerging technology which is expected to revolutionize the automotive and healthcare sector.
We will examine both risk and technology value streams at the strategic level, discuss the capabilities needed for cross-team value streams and describe how to design relevant business-focused metrics
Learn about security practices through a real-world example of a mid-sized company that wanted to align relevant security metrics with business goals.
In this webinar, we introduce the idea of making smarter use of current DevOps pipelines. As we gather insights through the SDLC process, using this information for further analysis can be fruitful.
In this webinar, we will discuss how technology leaders can balance security with the speed of software development through automation.
Regardless of your security toolbox, the risk of a breach is significant if you don't have buy-in from ALL employees. Learn how you can foster an effective security culture!