Other content in this Stream
Technology threat landscapes change rapidly, enterprises realize the value of integrating threat modeling with DevSecOps to protect systems better without hindering the speed brought about by DevOps.
Thursday, September 23, 2021 2:00 pm EDT
Join us as we discuss the key concepts and components of a cATO architecture and walk through a use case of how the implementation works.
U.S. federal government agencies are under constant pressure to modernize their IT systems and consistently deliver applications faster.
View our panel discussion as we discuss how threat modeling is evolving into a multi-stakeholder activity that suggests mitigations on an ongoing basis to drive down risk for critical business assets.
Join us as we discuss how to successfully integrate firmware and software security into a system delivery model that produces secure systems and products.
This webinar will introduce you to the concept of continuous authorization and indicate how to achieve it.
DevSecOps Days Toronto 2021, Hosted by Security Compass.
Security and risk practitioners play a key role in cloud adoption that enables business agility. Security engineers must see that all deployment artifacts conform to the unique attributes of cloud inf
Continuous ATO is an attempt at trying to build security into the software lifecycle from the beginning rather than trying to add it at the end, accepting ongoing security risk.
We discuss with an expert panel, the benefits of a security culture, the attributes of a security culture, and building a security culture with clear intentions.
Learn how to use Enterprise Architecture as a framework for achieving this balance. Ultimately, value creation is unique to each organization.
In this webinar, we will examine how security can be an enabler for lean software development.
This webinar will walk through the science of e-learning and discuss how to think about designing an effective program that delivers measurable business value.
Approaching creation and deployment of security controls from different stakeholder perspectives. Diverse perspectives will help you avoid pitfalls when implementing security controls in DevSecOps
We talk about the nuances of 5G as well as introduce you to security and privacy concerns with this emerging technology which is expected to revolutionize the automotive and healthcare sector.
In this webinar, we will discuss how business value is at the heart of DevOps. All our processes and techniques should provide stakeholders the information they need to balance business speed and enab
We will examine both risk and technology value streams at the strategic level, discuss the capabilities needed for cross-team value streams and describe how to design relevant business-focused metrics
Learn about security practices through a real-world example of a mid-sized company that wanted to align relevant security metrics with business goals.
In this webinar, we introduce the idea of making smarter use of current DevOps pipelines. As we gather insights through the SDLC process, using this information for further analysis can be fruitful.