Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.
Vulnerabilities in Containerized Production Environments
With each new technology cycle, businesses seek to improve both efficiency and security. Unfortunately, legacy practices can severely hold them back from achieving the full potential of their new technology stacks. When this occurs, organizations with the most valuable data come under attack first.
In this webinar, senior technology evangelist Tim Mackey at Synopsys discusses how this paradigm is playing out within financial services organizations moving from a virtual world to a containerized world. He covers how modern applications differ from those of only a few years ago—and how containerization changes our security paradigms.
When: Tuesday, Dec. 10 @ 1 p.m. Eastern / 10 a.m. Pacific
Who: Tim Mackey, principal security strategist, Synopsys
Security Tool Misconfiguration and Abuse
As your organization’s security program matures, you’ll improve your security posture by adding tools and techniques to automate processes such as asset management and discovery, patch management, software deployment, and vulnerability discovery. However, if you don’t configure your tools properly, they can lead to the total compromise of your network by an attacker.
In this webinar, Thomas Richards will present cases where penetration testers were able to abuse these tools, as well as remediation methods to prevent attacks.
When: Wednesday, Dec. 11 @ 9 a.m. Central European Time
Who: Thomas Richards, network and red team practice director, Synopsys
The State of Open Source in M&A Transactions
Based extensive experience in M&A, West Monroe Partners is on the front line of tech due diligence, and they’ve seen a few trends emerge when it comes to open source and M&A deals. Buyers and seller alike need to understand these trends to get the most value out of any transaction.
Join us for this live webinar to learn what buyers and sellers need to know, and how they operate during a transaction. We’ll cover:
- Why OSS management should fit into a broader security program
- How (and when) sellers need to prepare for a transaction
- How buyers are becoming more sophisticated in a transaction
When: Thursday, Dec. 12 @ 12 p.m. Eastern / 9 a.m. Pacific
Who: Chris Stafford, senior Manager, M&A advisory, West Monroe Partners; Paul Cotter, senior architect, West Monroe Partners; Phil Odence, GM of Black Duck Audits, Synopsys
*** This is a Security Bloggers Network syndicated blog from Software Integrity Blog authored by Synopsys Editorial Team. Read the original post at: https://www.synopsys.com/blogs/software-security/webinars-dec-9-13/