Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Open Source: A Key Link in the Software Supply Chain Anthony Decicco, GTC Law Group Open source makes the world go round. It’s easy to use and simple to plug in. Used correctly, it gives you the competitive edge you need to focus more... 2 months ago | 41 mins The Real Cost of Bad Software Quality in the U.S. in 2022 Herb Krasner, CISQ Advisory Board Member and Mike McGuire, Solutions Manager at Synopsys Tune in to learn more about “The Cost of Poor Software Quality in the US: A 2022 Report” that was recently published by CISQ. The 2020 edition of th... 3 months ago | 51 mins ChatGPT Security Implications John Yeoh, CSA; Aaron Bregg Corewell Health; Eric Cohen Cohen Computer Consulting; and Lars Ruddigkeit Microsoft ChatGPT has recently taken the world by storm. Quick school projects, coding projects, and other miscellaneous yet difficult tasks have seemingly beco... 2 hours ago | 38 mins Innovate Safely and Securely at the Edge Theresa Lanowitz AT&T Head of Cybersecurity Evangelism and Steve Winterfeld, Advisory CISO, Akamai Security is at the center of digital transformation efforts. Part of those digital transformation allow for innovation at the edge with new network ar... 4 hours ago | 35 mins Analyzing ISO 27001:2022 Achieve Privacy and Security Compliance with Automation Jitendra Juthani, Dir. of Information Security and Risk, onetrust | Vincent Tham, Senior Solutions Engineer, onetrust Privacy best practices are rooted in security standards such as ISO 27001, the globally recognized and adopted InfoSec framework which was recently up... March 29, 2023 3:00pm CyberSaint Roadmap Review: Risk Presets, Cyber Risk Actuarial Data, and more Padraic O'Reilly, Co-Founder & Chief Product Officer | Scott Shidlovsky, VP of Engineering Learn more about what's coming to the CyberStrong platform, including, Advisen data-backed Risk Presets with pre-populated loss frequency, loss exposu... March 29, 2023 6:00pm Five Principles of Modern Application Security Programs Chris Lindsey, Senior Solutions Architect at Mend & Marina Novikova, Senior Partner Solution Architect at AWS Organizations of all kinds are experiencing increasing volumes, frequency and severity of cyberattacks. 71% of IT and security leaders say that their ... 1 day ago | 57 mins Automate like an expert with Ansible Validated Content Emily Bock, Massimo Ferrari At AnsibleFest 2022, we announced the launch of Ansible validated content. This new initiative is focused on delivering an expert-led approach for aut... March 29, 2023 4:00pm Survival or Strategy? Business Drivers That Motivate Cloud Migrations Andrew Wickett, VP North American AM2C & AMC Enterprise Expansion, growth, survival, competition, cost reduction – whatever the reason, whatever the industry, whatever the technology - moving the mainframe ... March 29, 2023 3:00pm Shift Left: Five Reasons Why You Should Extend DevSecOps to Your SAP Environment David D'Aprile, VP of Product Marketing, Onapsis What is DevSecOps? It is the process of implementing security best practices within the application development lifecycle. As digital transformation p... 5 days ago | 26 mins Load more