Webinars

Watch this space for interesting discussions with cybersecurity experts

  • Maintain Software Security During Code Changes58:00

    Maintain Software Security During Code Changes

    Developers make software updates to add new features, enhance their structures, or fix bugs. These frequent changes occasionally impact the security of the software, for instance, by breaking authenti

    Watch Video
  • Smart Software Delivery Pipelines | Speakers: Hasan Yasar & Altaz Valani

    Smart Software Delivery Pipelines | Speakers: Hasan Yasar & Altaz Valani

    August, 27th Thursday; 11:00 a.m. (EST)

    Read Article
  • Build a Sustainable DevOps Program by Focusing on Business Value | Bob Aiello & Altaz Valani

    Build a Sustainable DevOps Program by Focusing on Business Value | Bob Aiello & Altaz Valani

    August 16th, Thursday; 11:00 a.m. (EST)

    Read Article
  • Integrate Security in Your DevOps Processes | Speakers: Ayhan Tek & Altaz Valani

    Integrate Security in Your DevOps Processes | Speakers: Ayhan Tek & Altaz Valani

    August 6th, Thursday; 11:00 a.m. (EST)

    Read Article
  • Research Perspectives on Lightweight Security Risk Assessments | Speakers: Christopher Schmitz, Sebastian Pape, Simone Curzi & Hasan Yasar

    Research Perspectives on Lightweight Security Risk Assessments | Speakers: Christopher Schmitz, Sebastian Pape, Simone Curzi & Hasan Yasar

    July 23rd, Thursday; 11:00 a.m. (EST)

    Read Article
  • Security Value Streams57:04

    Security Value Streams

    In a fast-evolving business context, every team must be able to articulate how they provide business value. For security teams, many times the conversation becomes too technical for a business stakeho

    Watch Video
  • How a Recruiter Thinks: Expert Tips on Finding a Job33:26

    How a Recruiter Thinks: Expert Tips on Finding a Job

    We are organizing this webinar to help job seekers find the right opportunities during these challenging times. As recruiters, we want to give you the inside scoop on how we think and share some essen

    Watch Video
  • Balancing DevOps Speed and Business Risk | Speakers: Victoria (Vicky) Hailey & Altaz Valani

    Balancing DevOps Speed and Business Risk | Speakers: Victoria (Vicky) Hailey & Altaz Valani

    July 30th, Thursday; 11:00 a.m. (EST)

    Read Article
  • A Research Review of IoT Security | Speakers: Dr. Manar Alalfi & Altaz Valani

    A Research Review of IoT Security | Speakers: Dr. Manar Alalfi & Altaz Valani

    July 16th, Thursday; 11:00 a.m. (EST)

    Read Article
  • Server-Side Request Forgery (SSRF): Defining a Hunt Methodology53:51

    Server-Side Request Forgery (SSRF): Defining a Hunt Methodology

    As web applications migrate to cloud environments and interactions between services become more complex, server-side request forgery (SSRF) attacks pose an increasing threat to businesses. Security te

    Watch Video
  • The Intersection of Software Development and Privacy49:49

    The Intersection of Software Development and Privacy

    In today’s world, privacy concerns during software development are critical. We need to consider how we collect, store, share, and archive information across the DevSecOps process in a way that respec

    Watch Video
  • Evolving Threat Modeling to fit DevOps | Speakers: Ruth G. Lennon & Altaz Valani

    Evolving Threat Modeling to fit DevOps | Speakers: Ruth G. Lennon & Altaz Valani

    July 9th, Thursday; 11:00 a.m. (EST)

    Read Article
  • Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory50:33

    Using MITRE ATT&CK in the Cloud: TTPs, Tools, and Trajectory

    Join our webinar for insight into the MITRE ATT&CK framework. Our team uses this framework extensively in on-premise infrastructure testing and during purple team exercises to test security controls.

    Watch Video
  • The Business Value of Security in DevSecOps58:40

    The Business Value of Security in DevSecOps

    Security measures in DevSecOps are sometimes seen as impediments to speed. The sole focus on security tools and vulnerability metrics does little to explain the business value of security. At its core

    Watch Video
  • Attacking & Defending Containers - Part 236:52

    Attacking & Defending Containers - Part 2

    Join us for a webinar to take a deep dive into common security issues associated with Docker containers and their implications on the DevOps pipeline. We will also review the best practices for secure

    Watch Video
  • Engaging Developers to Scale Threat Modeling36:11

    Engaging Developers to Scale Threat Modeling

    Threat modeling has traditionally been executed by Security teams. The challenges, goals, motivations of Security and Engineering teams are different. Quite often, engaging Engineering on security act

    Watch Video
  • Attacking and Defending Containers – Part 136:39

    Attacking and Defending Containers – Part 1

    Join us on an investigative journey to explore the containerization and the perspective of IT professionals who embraced the containerization as part of the digital transformation. You’ll look at the

    Watch Video
  • Delivering and scaling secure microservice-based products for any-cloud*54:58

    Delivering and scaling secure microservice-based products for any-cloud*

    Many large enterprises and government units prefer to run applications in private clouds, and cannot accept SaaS solutions. When catering to these markets, designing your applications for multiple, re

    Watch Video
  • Webinar- Secure Application Development from Policy to Procedure50:21

    Webinar- Secure Application Development from Policy to Procedure

    Watch Video
  • Webinar- Overcoming DevSecOps Challenges58:58

    Webinar- Overcoming DevSecOps Challenges

    Watch Video
  • loading
    Loading More...