Webinars

Watch this space for interesting discussions with cybersecurity experts.

  • Building a Security Culture | Speakers: Jaynee Beach, John Martin, Spencer Koch, Ayhan Tek & Altaz Valani

    Building a Security Culture | Speakers: Jaynee Beach, John Martin, Spencer Koch, Ayhan Tek & Altaz Valani

    Dec 10, 2020 | Thursday, 11:00 a.m. (EST)

    Read Article
  • Enterprise Architecture & Security59:40

    Enterprise Architecture & Security

    Learn how to use Enterprise Architecture as a framework for achieving this balance. Ultimately, value creation is unique to each organization.

    Watch Video
  • Turn Security from a Blocker to an Enabler for Lean Software Development58:18

    Turn Security from a Blocker to an Enabler for Lean Software Development

    In this webinar, we will examine how security can be an enabler for lean software development.

    Watch Video
  • Build a Sustainable E-Learning Program that Delivers Value59:35

    Build a Sustainable E-Learning Program that Delivers Value

    This webinar will walk through the science of e-learning and discuss how to think about designing an effective program that delivers measurable business value.

    Watch Video
  • Build the Right Security Controls Into DevSecOps1:00:20

    Build the Right Security Controls Into DevSecOps

    Approaching creation and deployment of security controls from different stakeholder perspectives. Diverse perspectives will help you avoid pitfalls when implementing security controls in DevSecOps

    Watch Video
  • An Introduction to Security in 5G49:00

    An Introduction to Security in 5G

    We talk about the nuances of 5G as well as introduce you to security and privacy concerns with this emerging technology which is expected to revolutionize the automotive and healthcare sector.

    Watch Video
  • Aligning Security to Drive Business Value1:00:33

    Aligning Security to Drive Business Value

    We will examine both risk and technology value streams at the strategic level, discuss the capabilities needed for cross-team value streams and describe how to design relevant business-focused metrics

    Watch Video
  • Align Your Security Metrics Across Business and DevOps51:21

    Align Your Security Metrics Across Business and DevOps

    Learn about security practices through a real-world example of a mid-sized company that wanted to align relevant security metrics with business goals.

    Watch Video
  • Smart Software Delivery Pipelines1:00:45

    Smart Software Delivery Pipelines

    In this webinar, we introduce the idea of making smarter use of current DevOps pipelines. As we gather insights through the SDLC process, using this information for further analysis can be fruitful.

    Watch Video
  • Maintain Software Security During Code Changes58:00

    Maintain Software Security During Code Changes

    Developers make software updates to add new features, enhance their structures, or fix bugs. These frequent changes occasionally impact the security of the software, for instance, by breaking authenti

    Watch Video
  • The CIO Mandate: Driving Growth While Balancing DevSecOps Speed With Security56:16

    The CIO Mandate: Driving Growth While Balancing DevSecOps Speed With Security

    In this webinar, we will discuss how technology leaders can balance security with the speed of software development through automation.

    Watch Video
  • Integrate Security in Your DevOps Processes58:37

    Integrate Security in Your DevOps Processes

    In this webinar, we talk about how security can be integrated into traditional DevOps processes without getting in the way of delivery timelines. Listen now.

    Watch Video
  • Balancing DevOps Speed and Business Risk57:55

    Balancing DevOps Speed and Business Risk

    The focus on software delivery speed has created gaps in security which can be disastrous for a business. Learn how you can balance speed with security.

    Watch Video
  • Research Perspectives on Lightweight Security Risk Assessments Using Attack Trees58:04

    Research Perspectives on Lightweight Security Risk Assessments Using Attack Trees

    In this webinar, we talk about our ongoing research in automating attack trees for security control generation. Learn from use cases on how to scale attack trees.

    Watch Video
  • Evolving Threat Modeling to Fit DevOps57:44

    Evolving Threat Modeling to Fit DevOps

    Traditional threat modeling approaches don’t fit easily in today's fast-moving DevOps pipelines. Is there a way to speed-up these traditional processes?

    Watch Video
  • Balanced development automation for Technology Executives1:56

    Balanced development automation for Technology Executives

    Watch Video
  • Security Value Streams57:04

    Security Value Streams

    In the fast-evolving tech world, security teams must be able to explain how they provide business value without using complicated jargon. Let's learn how.

    Watch Video
  • How a Recruiter Thinks: Expert Tips on Finding a Job33:26

    How a Recruiter Thinks: Expert Tips on Finding a Job

    We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen

    Watch Video
  • Server-Side Request Forgery (SSRF): Defining a Hunt Methodology53:51

    Server-Side Request Forgery (SSRF): Defining a Hunt Methodology

    As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te

    Watch Video
  • The Intersection of Software Development and Privacy49:49

    The Intersection of Software Development and Privacy

    In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process in a way that respec

    Watch Video
  • loading
    Loading More...