Upcoming Webinars
Webinars – Where the Security World Learns
Below is a list of our upcoming webinars – a trove of valuable resources and information for the Security professionals.
You can also access past events and watch them on-demand. Registration is free. Enjoy!
You can also access past events and watch them on-demand. Registration is free. Enjoy!
Webinars List Navigation
How to Harden EKS With Terraform and Snyk
Misconfigurations in infrastructure-as-code (IaC) can be just as dangerous as vulnerabilities in code. Small mistakes in configuration can lead to the exposure of sensitive data on the internet, or private endpoints and ...
Fixing Hardcoded Secrets the Developer-Friendly Way
The practice of hard-coding secrets like passwords, tokens, and API keys is skyrocketing as applications increasingly leverage dependencies that require integration and Infrastructure-as-Code that must authenticate services. Yet, hardcoded secrets have been ...
Securing Infrastructure-as-Code From Tampering and Misconfigurations
Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ...
Securing Infrastructure-as-Code From Tampering and Misconfigurations
Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ...
Securing the Cloud
Cloud computing platforms are rife with misconfigurations, largely because they are provisioned by developers with little cybersecurity experience using infrastructure-as-code (IaC) tools. As a result, it’s up to cybersecurity teams to first ...
Shift Left: Balancing DevOps and Infrastructure Security
During this online roundtable, security experts from GitLab and Google Cloud will discuss these security challenges and how to address them to protect application code, infrastructure-as-code (IaC), open source components, APIs and ...
Getting HashiCorp Terraform Into Production
When starting their migration journey, many small teams adopt Terraform open source software (OSS) to provision their clouds using infrastructure-as-code (IaC). As teams expand, organizational challenges arise around collaboration, security, compliance and ...
Moving Beyond SBOMs to Secure the Software Supply Chain
Ensuring software integrity is harder than ever given the increasing assembly line complexity of open source dependencies, CI/CD toolchains, infrastructure-as-code and containers that now factor into the software development process. Successful high-profile ...
Automated Development and Protection With AWS CodePipeline
Join Trend Micro for an informative program on Infrastructure-as-Code deployment using AWS Developer tools: AWS CodeCommit, AWS CloudFormation, Python Script and Trend Micro API . We will dive into the benefits of ...
AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp
As teams leverage infrastructure-as-code (IaC) at scale on AWS, ops and platform teams are tasked with implementing provisioning standards to prevent security breaches, non-compliance or provisioning practices that drive cloud waste. With ...