Upcoming Webinars
Webinars – Where the Security World Learns
You can also access past events and watch them on-demand. Registration is free. Enjoy!
Webinars List Navigation
September 2023
What AI Doesn’t Know About Kubernetes in Production
https://webinars.securityboulevard.com/what-ai-doesnt-know-about-kubernetes-inhttps://webinars.securityboulevard.com/what-ai-doesnt-know-about-kubernetes-in-production-production As artificial intelligence continues to permeate various industries, it seems logical to incorporate it into our production operations. However, as Eldad Assis, a senior... Sponsored By JFrog Register
Cloud Security Turbocharged: A Wild Ride of Innovation, Threats and Staying Ahead
Buckle up for a thrilling journey through the fast-paced world of cloud security! As innovation and threats zoom ahead at breakneck speeds, old-fashioned approaches are... Sponsored By Sysdig Register
Cloud Security
It’s been more than 10 years since workloads initially began to be deployed on cloud computing platforms and organizations are still struggling to come to... Sponsored By Security Boulevard Register
A Guide to Smart Dependency Management
Dependencies play an important role in the software development life cycle. The use of pre-built, often third-party components are used at various stages such as... Sponsored By JFrog Register
October 2023
Way Too Vulnerable: Uncovering the State of the Identity Attack Surface
Organizations today rely on digital assets to conduct business, but identity threats have become a critical risk factor. As attackers relentlessly seek to compromise user... Sponsored By Silverfort Register
ASPM: Leveling the AppSec Playing Field
Modern applications are more complex, interconnected, and distributed than ever—and they’re changing at breakneck speed. To keep up, AppSec teams rely on disparate tools (SAST,... Sponsored By Apiiro Register
Shadow Access: Where IAM Meets Cloud Security
Cloud, application data, AI, and third-party access are growing concerns that create identity and access management (IAM) blind spots. These cloud IAM blind spots represent... Sponsored By Stack Identity Register
Securing Cloud-Native Applications Across the Software Development Life Cycle
Cloud-native applications open a new frontier for application risk from multiple sources. Risk reduction approaches for cloud-native applications need to take a holistic approach to... Sponsored By Mend | AWS Register
Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities
Picture this: Your application is composed of 12 Docker containers. Together, they have 400 packages. Your SCA scan detects 120 critical and high vulnerabilities. Your... Sponsored By Deepfactor Register
Managing Security Posture and Entitlements in the Cloud
Federating access and ensuring compliance across multi-cloud and hybrid environments is a challenge. This is especially true without proper visibility and processes in place to... Sponsored By Tenable Register