Upcoming Webinars
Webinars – Where the Security World Learns
You can also access past events and watch them on-demand. Registration is free. Enjoy!
Webinars List Navigation
October 2023
When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig
Security leaders are wrestling with managing and mitigating cloud risk. Cloud brings speed and automation, but adversaries are moving faster than ever. Seconds matter. Organizations... Sponsored By Sysdig Register
Reporting From the Pipeline: The State of Software Security in DevOps
Requisite for proper DevSecOps, integrated security controls across the development lifecycle and CI pipelines establish mechanisms for rapid risk detection, accelerated remediation, and automated security... Sponsored By Synopsys Register
How to Shift Left the Right Way
Application Security isn’t just a security problem. It’s a business problem. While many organizations understand the benefits of shifting security left, they fail to consider... Sponsored By StackHawk Register
AppSec 101: Complete Application Security Across the SDLC
Whether you create your applications in-house or through a third party, testing for vulnerabilities early before production is essential to save time and reduce cost.... Sponsored By Outpost24 Register
November 2023
AWS Immersion Day: Secure Container Workloads In Build-Time With Snyk
With cloud deployments transforming what was traditionally 'infrastructure' to code, development and security teams face new, increased pressure in their attempt to build secure applications... Sponsored By AWS | Snyk Register
Protect Your APIs Today, for a Safer Tomorrow
Protecting APIs from attack has emerged as a top-of-mind priority for security organizations heading into 2024. As security pros begin to build plans and strategies,... Sponsored By ThreatX Register
The Secret Life of Secrets
Cloud services are on the rise with ever-growing workloads as more and more secrets are being created by the R&D teams. The number and variety... Sponsored By Entro Register
Fortifying Digital Defense: Thriving Amidst Emerging Cybersecurity Threats
Defending against tomorrow's cybersecurity threats requires starting to prepare your defenses today. As the threat landscape evolves, your strategy must evolve and adapt to identify... Sponsored By Kasada Register
Protecting Your Software Supply Chain From Code to Cloud on AWS
Trusted software supply chain (SSC) security starts at the beginning of the software development life cycle, before a package even enters your systems. Millions of... Sponsored By JFrog Register
Financial Impact of a Threat
Join Huntress CFO, Marcos Torres and Principle Security Researcher, John Hammond, as we look at the continuing financial complications following a cyberattack. Financial losses are... Sponsored By Huntress Labs Register