Loading Webinars

Upcoming Webinars

Webinars – Where the Security World Learns

Below is a list of our upcoming webinars – a trove of valuable resources and information for the Security professionals.
You can also access past events and watch them on-demand. Registration is free. Enjoy!
Find Webinars

Event Views Navigation

Webinars List Navigation

How to Harden EKS With Terraform and Snyk

How to Harden EKS With Terraform and Snyk

|
Misconfigurations in infrastructure-as-code (IaC) can be just as dangerous as vulnerabilities in code. Small mistakes in configuration can lead to the exposure of sensitive data on the internet, or private endpoints and ...
Fixing Hardcoded Secrets the Developer-Friendly Way

Fixing Hardcoded Secrets the Developer-Friendly Way

|
The practice of hard-coding secrets like passwords, tokens, and API keys is skyrocketing as applications increasingly leverage dependencies that require integration and Infrastructure-as-Code that must authenticate services. Yet, hardcoded secrets have been ...
Securing Infrastructure-as-Code From Tampering and Misconfigurations

Securing Infrastructure-as-Code From Tampering and Misconfigurations

|
Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ...
Securing Infrastructure-as-Code From Tampering and Misconfigurations

Securing Infrastructure-as-Code From Tampering and Misconfigurations

|
Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ...
Securing the Cloud

Securing the Cloud

|
Cloud computing platforms are rife with misconfigurations, largely because they are provisioned by developers with little cybersecurity experience using infrastructure-as-code (IaC) tools. As a result, it’s up to cybersecurity teams to first ...
Shift Left: Balancing DevOps and Infrastructure Security

Shift Left: Balancing DevOps and Infrastructure Security

|
During this online roundtable, security experts from GitLab and Google Cloud will discuss these security challenges and how to address them to protect application code, infrastructure-as-code (IaC), open source components, APIs and ...
Getting HashiCorp Terraform Into Production

Getting HashiCorp Terraform Into Production

|
When starting their migration journey, many small teams adopt Terraform open source software (OSS) to provision their clouds using infrastructure-as-code (IaC). As teams expand, organizational challenges arise around collaboration, security, compliance and ...
Moving Beyond SBOMs to Secure the Software Supply Chain

Moving Beyond SBOMs to Secure the Software Supply Chain

|
Ensuring software integrity is harder than ever given the increasing assembly line complexity of open source dependencies, CI/CD toolchains, infrastructure-as-code and containers that now factor into the software development process. Successful high-profile ...
Automated Development and Protection With AWS CodePipeline

Automated Development and Protection With AWS CodePipeline

|
Join Trend Micro for an informative program on Infrastructure-as-Code deployment using AWS Developer tools: AWS CodeCommit, AWS CloudFormation, Python Script and Trend Micro API . We will dive into the benefits of ...
AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

|
As teams leverage infrastructure-as-code (IaC) at scale on AWS, ops and platform teams are tasked with implementing provisioning standards to prevent security breaches, non-compliance or provisioning practices that drive cloud waste. With ...
+ Export Calendar