
×
Watch & Learn More on Scaling Your Cybersecurity Threat Modeling Today.
Thank you!
Error - something went wrong!
Watch & Learn More on Scaling Your Cybersecurity Threat Modeling Today.
This webinar will introduce you to the concept of continuous authorization and indicate how to achieve it. Here’s what you’ll learn in this webinar: Why software security is vital for the defense sect
March 31, 2021 | Wednesday, 11:30 a.m. (EST)
Security and risk practitioners play a key role in cloud adoption that enables business agility. Security engineers must see that all deployment artifacts conform to the unique attributes of cloud inf
Continuous ATO is an attempt at trying to build security into the software lifecycle from the beginning rather than trying to add it at the end, accepting ongoing security risk.
We discuss with an expert panel, the benefits of a security culture, the attributes of a security culture, and building a security culture with clear intentions.
Learn how to use Enterprise Architecture as a framework for achieving this balance. Ultimately, value creation is unique to each organization.
In this webinar, we will examine how security can be an enabler for lean software development.
This webinar will walk through the science of e-learning and discuss how to think about designing an effective program that delivers measurable business value.
Approaching creation and deployment of security controls from different stakeholder perspectives. Diverse perspectives will help you avoid pitfalls when implementing security controls in DevSecOps
We talk about the nuances of 5G as well as introduce you to security and privacy concerns with this emerging technology which is expected to revolutionize the automotive and healthcare sector.
In this webinar, we will discuss how business value is at the heart of DevOps. All our processes and techniques should provide stakeholders the information they need to balance business speed and enab
We will examine both risk and technology value streams at the strategic level, discuss the capabilities needed for cross-team value streams and describe how to design relevant business-focused metrics
Learn about security practices through a real-world example of a mid-sized company that wanted to align relevant security metrics with business goals.
In this webinar, we introduce the idea of making smarter use of current DevOps pipelines. As we gather insights through the SDLC process, using this information for further analysis can be fruitful.
Developers make software updates to add new features, enhance their structures, or fix bugs. These frequent changes occasionally impact the security of the software, for instance, by breaking authenti
In this webinar, we will discuss how technology leaders can balance security with the speed of software development through automation.
In this webinar, we talk about how security can be integrated into traditional DevOps processes without getting in the way of delivery timelines. Listen now.
The focus on software delivery speed has created gaps in security which can be disastrous for a business. Learn how you can balance speed with security.
In this webinar, we talk about our ongoing research in automating attack trees for security control generation. Learn from use cases on how to scale attack trees.