[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.

Register for our webinar about vulnerabilities in containers

Vulnerabilities in Containerized Production Environments

With each new technology cycle, businesses seek to improve both efficiency and security. Unfortunately, legacy practices can severely hold them back from achieving the full potential of their new technology stacks. When this occurs, organizations with the most valuable data come under attack first.

In this webinar, senior technology evangelist Tim Mackey at Synopsys discusses how this paradigm is playing out within financial services organizations moving from a virtual world to a containerized world. He covers how modern applications differ from those of only a few years ago—and how containerization changes our security paradigms.

What: Vulnerabilities in Containerized Production Environments

When: Tuesday, Dec. 10 @ 1 p.m. Eastern / 10 a.m. Pacific

Who: Tim Mackey, principal security strategist, Synopsys

Register now

Register for the security tool abuse webinar

Security Tool Misconfiguration and Abuse

As your organization’s security program matures, you’ll improve your security posture by adding tools and techniques to automate processes such as asset management and discovery, patch management, software deployment, and vulnerability discovery. However, if you don’t configure your tools properly, they can lead to the total compromise of your network by an attacker.

In this webinar, Thomas Richards will present cases where penetration testers were able to abuse these tools, as well as remediation methods to prevent attacks.

What: Security Tool Misconfiguration and Abuse

When: Wednesday, Dec. 11 @ 9 a.m. Central European Time

Who: Thomas Richards, network and red team practice director, Synopsys

Register now

Register for our webinar about open source in M&A

The State of Open Source in M&A Transactions

Based extensive experience in M&A, West Monroe Partners is on the front line of tech due diligence, and they’ve seen a few trends emerge when it comes to open source and M&A deals. Buyers and seller alike need to understand these trends to get the most value out of any transaction.

Join us for this live webinar to learn what buyers and sellers need to know, and how they operate during a transaction. We’ll cover:

  • Why OSS management should fit into a broader security program
  • How (and when) sellers need to prepare for a transaction
  • How buyers are becoming more sophisticated in a transaction

What: The State of Open Source in M&A Transactions

When: Thursday, Dec. 12 @ 12 p.m. Eastern / 9 a.m. Pacific

Who: Chris Stafford, senior Manager, M&A advisory, West Monroe Partners; Paul Cotter, senior architect, West Monroe Partners; Phil Odence, GM of Black Duck Audits, Synopsys

Register now

*** This is a Security Bloggers Network syndicated blog from Software Integrity Blog authored by Synopsys Editorial Team. Read the original post at: