Events & Webinars

Watch this space for interesting discussions with cybersecurity experts.

  • The Evolution of Threat Modeling and DevSecOps55:42

    The Evolution of Threat Modeling and DevSecOps

    Technology threat landscapes change rapidly, enterprises realize the value of integrating threat modeling with DevSecOps to protect systems better without hindering the speed brought about by DevOps.

    Watch Video
  • State of Cloud Adoption

    State of Cloud Adoption

    Thursday, September 23, 2021 2:00 pm EDT

    Watch Now
  • Enabling Authority to Operate (ATO) in the U.S. Federal Government with SD Elements49:46

    Enabling Authority to Operate (ATO) in the U.S. Federal Government with SD Elements

    Watch Video
  • Learn to Implement a cATO Architecture57:56

    Learn to Implement a cATO Architecture

    Join us as we discuss the key concepts and components of a cATO architecture and walk through a use case of how the implementation works.

    Watch Video
  • Obtaining ATO and cATO in the U.S. Federal Government: Software Security Best Practices & Lessons Learned59:15

    Obtaining ATO and cATO in the U.S. Federal Government: Software Security Best Practices & Lessons Learned

    U.S. federal government agencies are under constant pressure to modernize their IT systems and consistently deliver applications faster.

    Watch Video
  • Scaling Threat Modeling Beyond STRIDE and Data Flows59:04

    Scaling Threat Modeling Beyond STRIDE and Data Flows

    View our panel discussion as we discuss how threat modeling is evolving into a multi-stakeholder activity that suggests mitigations on an ongoing basis to drive down risk for critical business assets.

    Watch Video
  • Managing Risk Where Hardware and DevOps Converge57:28

    Managing Risk Where Hardware and DevOps Converge

    Join us as we discuss how to successfully integrate firmware and software security into a system delivery model that produces secure systems and products.

    Watch Video
  • Continuous Authorization with DevSecOps1:00:08

    Continuous Authorization with DevSecOps

    This webinar will introduce you to the concept of continuous authorization and indicate how to achieve it.

    Watch Video
  • DevSecOps Days6:23:13

    DevSecOps Days

    DevSecOps Days Toronto 2021, Hosted by Security Compass.

    Watch Video
  • Security Concerns with Cloud Enablement1:01:33

    Security Concerns with Cloud Enablement

    Security and risk practitioners play a key role in cloud adoption that enables business agility. Security engineers must see that all deployment artifacts conform to the unique attributes of cloud inf

    Watch Video
  • Achieving Continuous ATO through Security1:03:25

    Achieving Continuous ATO through Security

    Continuous ATO is an attempt at trying to build security into the software lifecycle from the beginning rather than trying to add it at the end, accepting ongoing security risk.

    Watch Video
  • Building a Security Culture59:33

    Building a Security Culture

    We discuss with an expert panel, the benefits of a security culture, the attributes of a security culture, and building a security culture with clear intentions.

    Watch Video
  • Enterprise Architecture & Security59:40

    Enterprise Architecture & Security

    Learn how to use Enterprise Architecture as a framework for achieving this balance. Ultimately, value creation is unique to each organization.

    Watch Video
  • Turn Security from a Blocker to an Enabler for Lean Software Development58:18

    Turn Security from a Blocker to an Enabler for Lean Software Development

    In this webinar, we will examine how security can be an enabler for lean software development.

    Watch Video
  • Build a Sustainable E-Learning Program that Delivers Value59:35

    Build a Sustainable E-Learning Program that Delivers Value

    This webinar will walk through the science of e-learning and discuss how to think about designing an effective program that delivers measurable business value.

    Watch Video
  • Build the Right Security Controls Into DevSecOps1:00:20

    Build the Right Security Controls Into DevSecOps

    Approaching creation and deployment of security controls from different stakeholder perspectives. Diverse perspectives will help you avoid pitfalls when implementing security controls in DevSecOps

    Watch Video
  • An Introduction to Security in 5G49:00

    An Introduction to Security in 5G

    We talk about the nuances of 5G as well as introduce you to security and privacy concerns with this emerging technology which is expected to revolutionize the automotive and healthcare sector.

    Watch Video
  • Build a Sustainable DevOps Program by Focusing on Business Value59:41

    Build a Sustainable DevOps Program by Focusing on Business Value

    In this webinar, we will discuss how business value is at the heart of DevOps. All our processes and techniques should provide stakeholders the information they need to balance business speed and enab

    Watch Video
  • Aligning Security to Drive Business Value1:00:33

    Aligning Security to Drive Business Value

    We will examine both risk and technology value streams at the strategic level, discuss the capabilities needed for cross-team value streams and describe how to design relevant business-focused metrics

    Watch Video
  • Align Your Security Metrics Across Business and DevOps51:21

    Align Your Security Metrics Across Business and DevOps

    Learn about security practices through a real-world example of a mid-sized company that wanted to align relevant security metrics with business goals.

    Watch Video
  • loading
    Loading More...