On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

Inside an AWS Breach Investigation

Inside an AWS Breach Investigation

With the visibility provided by the Threat Stack Cloud Security Platform®, the Threat Stack Security team has the unique ability to observe user, system and file trends across cloud infrastructure, to see how bad actors are attempting to exploit it. Over the past year, the team has observed strong evidence ... Read More
August 16, 2018
Threat Stack
Mastering Machine Learning for Security Professionals: A Discussion

Mastering Machine Learning for Security Professionals: A Discussion

Machine learning is well on its way to becoming the backbone of cybersecurity, as attackers increasingly discover new and more damaging ways to infiltrate networks. As a result, companies that don’t include machine learning in their security posture will find themselves at greater risk. In this webinar, we’ll sort the ... Read More
July 31, 2018
Security Boulevard
Draft and Develop: A Solution to the Cyber Security Skills Shortage

Draft and Develop: A Solution to the Cyber Security Skills Shortage

By 2019, the nonprofit group ISACA predicts a global shortage of two million cyber security professionals. Security can no longer work in a silo– they now need to communicate across the business and balance the needs of multiple stakeholders from product line managers to ops teams. Outreach’s CISO, Martin Rues, ... Read More
July 26, 2018
Threat Stack
DevOps Security: Build-Time Identification of Security Issues — A case study with Jenkins, Docker, and AWS

DevOps Security: Build-Time Identification of Security Issues — A case study with Jenkins, Docker, and AWS

DevOps is radically changing the way organizations provision and deploy services. Information security is playing catch-up with the shifts introduced by these new processes and tools. The result is a security gap in DevOps managed systems. In this webinar, you’ll learn strategies for addressing the most significant security issues proactively ... Read More
July 24, 2018
TripWire
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!

Embrace DevSecOps and Enjoy a Significant Competitive Advantage!

As security and privacy permeate companies’ business practices, DevOps is leading a transformation in the way software is built and delivered. And despite its substantial organizational, cultural and technological requirements, DevOps continues to grow in popularity. Companies that are adopting continuous delivery disciplines demonstrate better IT and organizational performance. To ... Read More
July 18, 2018
Veracode
The 4 Current Threats Enterprises Can’t Ignore

The 4 Current Threats Enterprises Can’t Ignore

The changing digital landscape of data and devices is creating a perfect storm of opportunity for cybercriminals. Enterprises today are prime targets, as more users access more data using more—and more varied—devices. In particular, enterprises today must contend with issues including ransomware, IoT security flaws, DDoS attacks and managing mobile ... Read More
July 17, 2018
Security Boulevard
Improving Software Security in an Agile Environment: A Case Study

Improving Software Security in an Agile Environment: A Case Study

Security often isn’t the top priority for many developers, who already are juggling multiple projects and deadlines. In fact, security seems to get in the way of keeping up with the pace of business. However, developers control a critical piece of the security puzzle and need to be engaged in ... Read More
June 21, 2018
Secure Code Warrior
Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

According to Gartner, the application layer contains 90% of all vulnerabilities. However, do security experts and developers know what’s happening underneath the application layer? Organizations are aware they cannot afford to let potential system flaws or weaknesses in applications be exploited, but knowing the distinctions between these weaknesses can make ... Read More
May 29, 2018
Veracode
Security at the Speed of Software Development

Security at the Speed of Software Development

There are a lot of DevSecOps offerings that are just DevOps lipstick on a traditional security-as-a-gate pig. Also, security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy an order of magnitude or ... Read More
May 8, 2018
WhiteSource
You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps

You Build It, You Secure It: Higher Velocity and Better Security with DevSecOps

It’s 30 times cheaper to fix a security defect in Development vs. Production, yet Security is often treated as an afterthought and a bottleneck.  It doesn’t have to be that way. DevSecOps practices build security and quality into the software delivery process by making EVERYONE responsible for security at every ... Read More
April 18, 2018
ElectricCloud
Loading...