Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Live now Developing with Python and Open Source in the Enterprise Cody Foxwell, Anaconda Solutions Engineer Using Python to build data applications for an enterprise organization brings many benefits, including leveraging the innovation of the community to h... June 6, 2023 4:00pm | 60 mins Zero Trust Architecture. Establishing a security blueprint: step by step Dr. Christopher Meyer, Product Manager Utimaco | Dr. Fabian Eidens, Technology Manager Utimaco Zero Trust Architecture. Establishing a security blueprint - step by step, brick by brick: Things to bear in mind when building your Zero Trust Archit... June 7, 2023 8:00am Explore application security tools and testing to strengthen software defenses Pankul Chitrav, Application Release Engineer | TD Bank In today's digital landscape, ensuring the security of software applications has become paramount. With the rise in cyber threats and the potential fo... June 7, 2023 5:00pm 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... June 8, 2023 9:00am Coffee with a Side of DevSecOps Steven Zimmerman, DevSecOps Solution Manager, Synopsys To build security into DevOps and achieve true DevSecOps, organizations need to manage AppSec workflows without hindering speed and flexibility. But h... June 8, 2023 12:00pm Top 10 Azure security tips from 10 years of securing Azure applications Karl Ots, Head of Cloud Security | EPAM In the last 10 years, Azure has become one of the most popular cloud platforms for businesses and organizations of all sizes. As the platform has evol... June 8, 2023 12:00pm What is SAST? Corey Hamilton, Security Solutions Manager, Synopsys Static application security testing (SAST) is a key ingredient of any AppSec program. However, modern applications are built using processes, language... 5 days ago | 29 mins Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 12:00pm Live now 2023 DBIR: Applying the DBIR to your Organization Ashish Khanna, Chris Novak, Jennifer Varner, and Kris Philipsen One of the very first questions asked upon the release of each new Verizon DBIR is "How should I apply this to my organization?" This panel discussion... June 6, 2023 4:00pm | 75 mins Navigating Your Organization Through Change -A Right Management Panel Discussion Gary Bennett- moderator, Donnita Lee- panelist, Beth Linderbaum- panelist, Jeff Strunk- panelist As businesses navigate the ever-changing world, organizational structures must evolve to ensure a viable path to future success. While nearly every or... June 6, 2023 5:00pm Load more