Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Threat Modeling Program Maturity – Establish and Mature Threat Modeling Programs Chandu Ketkar, Director Security Architecture Practice at Synopsys and Himanshu Tiwari, Managing Consultant at Synopsys What differentiates a highly mature threat modeling program from a less mature program? How do companies get started with threat modeling? What does t... July 14, 2022 6:00pm Push and manage secure code continuously with GitLab DevSecOps Fernando J. Diaz - Sr. Technical Marketing Manager GitLab provides many Scanners to secure your application such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAS... 8 months ago | 30 mins A Breakdown of the OWASP API Top 10 - What You Need to Know Matt Tesauro, Distinguished Engineer, Noname Security Securing APIs continues to be a never-ending challenge for many organizations. Putting focus on the important security issues first is a great way to ... 4 months ago | 62 mins Securing Terraform with IaC with the Regula Policy Engine Josh Stella, Fugue Co-Founder and CEO and Curtis Myzie, Fugue VP of Engineering Join us as Josh Stella and Curtis Myzie dig into using Regula, an open source policy engine for checking infrastructure as code. For this session they... 7 months ago | 53 mins Push and manage secure code continuously with GitLab DevSecOps Fernando J. Diaz - Sr. Technical Marketing Manager GitLab provides many Scanners to secure your application such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAS... 8 months ago | 26 mins API Security 101: The Why, Who, and How to Secure this Top Attack Surface Matt Tesauro, Director of Security Evangelism, Noname Security Nearly every modern application built today uses an API or is an API itself. The growth of APIs is increasing at an explosive rate or more that 60% Yo... 8 months ago | 31 mins Getting Started with DevSecOps Andrei Bezdedeanu, VP of Engineering, ZeroNorth Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. The chall... 3 years ago | 31 mins How to Get Started with DevSecOps Nabil Bousselham, Principal Solutions Architect @ Veracode As organizations adopt more and more on CICD practices to build, test and deploy their software applications, it becomes imperative that the software ... 4 years ago | 46 mins DevOps with Artificial and Augmented Intelligence Helen Beal - DevOps Institute | Adam Frank - Moogsoft | Richard Knaster - Digital.ai | Peter Maddison - Xodiac AI has officially entered the domain of DevOps. Forbes notes that “Startups offering AI-powered software development tools raise $704M over 12 months ... 1 year ago | 60 mins From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture D.J. Schleen, DevSecOps Practitioner & Expert // Brian Reed, Chief Mobility Officer (NowSecure) Everyone wants a well-organized, fast-flowing DevOps and DevSecOps pipeline, but building out an effective toolchain has its challenges. Whether you a... 2 years ago | 61 mins