Watch this space for interesting discussions with cybersecurity experts.
Smart Software Delivery Pipelines
In this webinar, we introduce the idea of making smarter use of current DevOps pipelines. As we gather insights through the SDLC process, using this information for further analysis can be fruitful.
The CIO Mandate: Driving Growth While Balancing DevSecOps Speed With Security
In this webinar, we will discuss how technology leaders can balance security with the speed of software development through automation.
An Introduction to Security in 5G | Speakers: Adam Greenhill & Josh Arsenio
Sept 24, 2020 | Thursday, 12 p.m (EST)
Build the Right Security Controls Into DevSecOps | Speakers: Dhruv Chandra, Spencer Koch, Gopi Reddy, & Altaz Valani
Oct 1, 2020 | Thursday; 11:00 a.m. (EST)
Enterprise Architecture & Security | Speakers: Hasan Yasar & Altaz Valani
Oct 8, 2020 | Thursday; 11:00 a.m. (EST)
Integrate Security in Your DevOps Processes
In this webinar, we talk about how security can be integrated into traditional DevOps processes without getting in the way of delivery timelines. Listen now.
Balancing DevOps Speed and Business Risk
The focus on software delivery speed has created gaps in security which can be disastrous for a business. Learn how you can balance speed with security.
Research Perspectives on Lightweight Security Risk Assessments Using Attack Trees
In this webinar, we talk about our ongoing research in automating attack trees for security control generation. Learn from use cases on how to scale attack trees.
Evolving Threat Modeling to Fit DevOps
Traditional threat modeling approaches don’t fit easily in today's fast-moving DevOps pipelines. Is there a way to speed-up these traditional processes?
Balanced development automation for Technology Executives
Security Value Streams
In the fast-evolving tech world, security teams must be able to explain how they provide business value without using complicated jargon. Let's learn how.
How a Recruiter Thinks: Expert Tips on Finding a Job
We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen
Server-Side Request Forgery (SSRF): Defining a Hunt Methodology
As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te
The Intersection of Software Development and Privacy
In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process in a way that respec
Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory
Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.
The Business Value of Security in DevSecOps
Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core
Attacking & Defending Containers - Part 2
Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline. We will also review the best practices for secure
Engaging Developers to Scale Threat Modeling
Threat modeling can lead to conflicts between security experts and developers as it's time-consuming and delays releases. Learn how to engage developers in security.
Attacking and Defending Containers – Part 1
Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the
Delivering and scaling secure microservice-based products for any-cloud*
Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. When catering to these markets, designing your applications for multiple, re