October 2023
When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig
Security leaders are wrestling with managing and mitigating cloud risk. Cloud brings speed and automation, but adversaries are moving faster than ever. Seconds matter. Organizations... Sponsored By Sysdig Register
Reporting From the Pipeline: The State of Software Security in DevOps
Requisite for proper DevSecOps, integrated security controls across the development lifecycle and CI pipelines establish mechanisms for rapid risk detection, accelerated remediation, and automated security... Sponsored By Synopsys Register
How to Shift Left the Right Way
Application Security isn’t just a security problem. It’s a business problem. While many organizations understand the benefits of shifting security left, they fail to consider... Sponsored By StackHawk Register
AppSec 101: Complete Application Security Across the SDLC
Whether you create your applications in-house or through a third party, testing for vulnerabilities early before production is essential to save time and reduce cost.... Sponsored By Outpost24 Register
November 2023
AWS Immersion Day: Secure Container Workloads In Build-Time With Snyk
With cloud deployments transforming what was traditionally 'infrastructure' to code, development and security teams face new, increased pressure in their attempt to build secure applications... Sponsored By AWS | Snyk Register
Protect Your APIs Today, for a Safer Tomorrow
Protecting APIs from attack has emerged as a top-of-mind priority for security organizations heading into 2024. As security pros begin to build plans and strategies,... Sponsored By ThreatX Register
The Secret Life of Secrets
Cloud services are on the rise with ever-growing workloads as more and more secrets are being created by the R&D teams. The number and variety... Sponsored By Entro Register
Fortifying Digital Defense: Thriving Amidst Emerging Cybersecurity Threats
Defending against tomorrow's cybersecurity threats requires starting to prepare your defenses today. As the threat landscape evolves, your strategy must evolve and adapt to identify... Sponsored By Kasada Register
Protecting Your Software Supply Chain From Code to Cloud on AWS
Trusted software supply chain (SSC) security starts at the beginning of the software development life cycle, before a package even enters your systems. Millions of... Sponsored By JFrog Register
Financial Impact of a Threat
Join Huntress CFO, Marcos Torres and Principle Security Researcher, John Hammond, as we look at the continuing financial complications following a cyberattack. Financial losses are... Sponsored By Huntress Labs Register
ASM/VM/CAASM
Attack surfaces have expanded dramatically in the past few years, with more assets and more vulnerabilities added each and every day. Cybersecurity teams need to... Sponsored By Security Boulevard Register
December 2023
API Security
As more APIs are deployed and invoked, the number of cybersecurity incidents involving these endpoints is starting to rise. Cybercriminals now realize APIs are not... Sponsored By Security Boulevard Register
February 2024
Ransomware
Ransomware continues to be the most disruptive and pernicious of all cyberattacks. There's still not a lot that can be done to prevent these attacks,... Sponsored By Security Boulevard Register
March 2024
Securing Open Source
It’s not just small startups that are dependent on open source software—enterprises and even many federal agencies are increasingly relying on open source software and... Sponsored By Security Boulevard Register
May 2024
Zero-Trust
Zero trust approaches to cybersecurity are all the age these days as cyberattacks continue to increase in volume and sophistication. The challenge is zero-trust isn’t... Sponsored By Security Boulevard Register