Upcoming Webinars
Webinars – Where the Security World Learns
Below is a list of our upcoming webinars – a trove of valuable resources and information for the Security professionals.
You can also access past events and watch them on-demand. Registration is free. Enjoy!
You can also access past events and watch them on-demand. Registration is free. Enjoy!
Webinars List Navigation
Security as Code
How can you adopt a Cloud Native DevOps model without sacrificing security? The answer is automation..In this webinar, we will focus on Ellie Mae’s strategy to automate the entire residential mortgage process ...
RSA 2018- What’s Hot in the Cyber Security Space
Love it or hate, the annual RSA Conference (RSAC) in San Francisco is the largest cyber security conference in world. It is where the world comes to talk and learn security. Inevitably ...
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps
It’s 30 times cheaper to fix a security defect in Development vs. Production, yet Security is often treated as an afterthought and a bottleneck. It doesn’t have to be that way. DevSecOps ...
Draft and Develop: A Solution to the Cyber Security Skills Shortage
By 2019, the nonprofit group ISACA predicts a global shortage of two million cyber security professionals. Security can no longer work in a silo– they now need to communicate across the business ...
Inside an AWS Breach Investigation
With the visibility provided by the Threat Stack Cloud Security Platform®, the Threat Stack Security team has the unique ability to observe user, system and file trends across cloud infrastructure, to see ...
3 Steps to Gain Control of Cloud Security
The cloud is a notable business advantage, but it does bring numerous security concerns. Among them: Lack of visibility across cloud or between on-premises and cloud environments Monitoring security controls and changes ...
Cloud Security: What You Need to Know
Cloud-based applications and services have become ubiquitous in the enterprise, and working via the cloud is now standard operating procedure for many organizations. But what about the security of those apps and ...
Operationalizing Data For Fraud Investigations
Security and Fraud teams are swimming in data. Data is not the problem, but operationalizing and making use of the data we have is, especially when it comes to fraud prevention. Join ...
3 Steps to Gain Control of Cloud Security
The cloud is a notable business advantage, but it does bring numerous security concerns. Among them: Lack of visibility across cloud or between on-premises and cloud environments Monitoring security controls and changes ...
Inside a Docker Cryptojacking Exploit
Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the ...