Watch this space for interesting discussions with cybersecurity experts.
Integrate Security in Your DevOps Processes
In today’s world, security is no longer an afterthought. Customer trust is built on assurance that best practices around security are being followed. This means using our DeOps processes for rapid, in
Balancing DevOps Speed and Business Risk
Emphasis on software delivery speed alone has created a vacuum when it comes to offering business value. The missing component is risk, which is all about regulatory requirements, compliance, privacy,
Research Perspectives on Lightweight Security Risk Assessments Using Attack Trees
In this webinar, we talk about our ongoing research in automating attack trees for security control generation. Learn from use cases on how to scale attack trees.
Evolving Threat Modeling to Fit DevOps
Traditional threat modeling approaches don’t fit easily in today's fast-moving DevOps pipelines. Is there a way to speed-up these traditional processes?
Maintain Software Security During Code Changes
Developers make software updates to add new features, enhance their structures, or fix bugs. These frequent changes occasionally impact the security of the software, for instance, by breaking authenti
Smart Software Delivery Pipelines | Speakers: Hasan Yasar & Altaz Valani
Aug 27, 2020 | Thursday; 11 a.m. (EDT)
Build a Sustainable DevOps Program by Focusing on Business Value | Bob Aiello & Altaz Valani
Aug 16, 2020 | Thursday; 11 a.m. (EDT)
Security Value Streams
In the fast-evolving tech world, security teams must be able to explain how they provide business value without using complicated jargon. Let's learn how.
How a Recruiter Thinks: Expert Tips on Finding a Job
We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen
Server-Side Request Forgery (SSRF): Defining a Hunt Methodology
As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te
The Intersection of Software Development and Privacy
In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process in a way that respec
Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory
Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.
The Business Value of Security in DevSecOps
Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core
Attacking & Defending Containers - Part 2
Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline. We will also review the best practices for secure
Engaging Developers to Scale Threat Modeling
Threat modeling can lead to conflicts between security experts and developers as it's time-consuming and delays releases. Learn how to engage developers in security.
Attacking and Defending Containers – Part 1
Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the
Delivering and scaling secure microservice-based products for any-cloud*
Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. When catering to these markets, designing your applications for multiple, re
Overcoming DevSecOps Challenges
In this webinar, we will cover: - The Importance of DevSecOps - Key DevSecOps Challenges and Barriers to Success - Overcoming DevSecOps Challenges
Learn how to comply with PCIs new Software Security Framework
As prescribed by the new PCI Software Security Framework, learn how to transform policy into actionable tasks for compliance.
Scaling Your Cybersecurity Threat Modeling
Director of Research, Mr. Altaz Valani, presents an outline of a threat modeling framework that abstracts traditional methods and provides a more scalable approach to cybersecurity threat modeling.