Attackers have many opportunities to strike on-site and cloud-based enterprise applications from early in the development process. But many solutions and tools — such as the emerging DevSecOps framework – are available to better secure applications and ensure security is prioritized within DevOps and application security testing tools. Tune into this summit to hear leading experts discuss how to secure applications in your enterprise infrastructure with strategies like DevSecOps along with the right combination of tools and testing.
View webinars, fireside chats and keynote presentations from leading security innovators, vendors and evangelists.
Tracks
Ensure security remains top priority in application development by implementing a DevSecOps strategy
Discover leading application security tools and testing solutions to accelerate and better organize the app development process
Learn how to best secure cloud and mobile-based applications with demonstrated strategies and helpful tools
Fireside Chats
How the New Web Application Architecture is Changing Web Application Security
Web applications are moving from traditional back-end and front-end architecture, deployed in an organization’s physical data center, to modern multi-cloud, microservices, and Kubernetes architectures, opening up new threat surfaces along the way. How are you to, for instance, secure application vulnerabilities from supply-chain attacks when your data is dispersed across multi-cloud applications?…
The Future of Attacker Automation and AI
Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and which are bots. Taking advantage of this blind spot, hackers can easily automate or scale attacks, imitate human mouse usage, or leverage AI tools like ChatGPT to assist…
How to Prioritize Critical Vulnerabilities to Protect Your Cloud Applications
As more organizations adopt microservices, containers, Kubernetes, and serverless architectures, the complexity of their IT environments continues to grow, creating an expanded attack surface. Given the dynamic and complex nature of cloud-native environments, how confident are you in your development and security teams’ ability to identify and prioritize the most significant security…
A Special thank you to our Sponsors!
Diamond Sponsors
Platinum Sponsors
Gold Sponsor
Featured Presenters
Gopinath Manimayan
Lead Architect – Digital Experience
Moonraft
Vincent Amanyi
Founder
Boleaum Inc.
Deveeshree Nayak
Assistant Teaching Professor
University of Washington School of Engineering and Technology
Karl Ots
Head of Cloud Security
EPAM
Eric Hanselman
Chief Analyst
451 Research
Justin Lam
Research Analyst TMT
S&P Global Market Intelligence
Keiron Shepherd
Senior Solutions Architect
F5 Networks
David Warburton
Director
F5 Labs
Bryan Glick
Editor-in-Chief
ComputerWeekly
Shweta Khare
Principal Technical Product Marketing Manager
Cisco ET&I
Matt Slotten
Director of Technical Marketing
Checkmarx
Bryant Schuck
Lead Product Manager
Checkmarx
Eyal Arazi
Senior Product Marketing Manager
Radware
Simon Ratcliffe
Principal Consultant
Ensono
Michelle Drolet
CEO & Founder
Towerwall
Arlen Baker
Principal Security Architect
Wind River
Dan McLoughlin
Field CTO
OneSpan
Lucas Gibbons
Senior Product Manager
OneSpan
Alexander Kuznetsov
Solutions Sales Manager
OneSpan
Zlatan Cekro
Senior Experience Engineer
OneSpan
John Grady
Principal Analyst
Enterprise Strategy Group
Doug Browne
Director for Cloud Security & SSE, APJC
Cisco Systems
Audience
CIOs, CTOs, MDs, Heads, EVPs, SVPs, VPs, Directors, Managers, Practitioners, and Consultants within:
IT / IT Architecture / IT Infrastructure
Systems Engineering
Software Engineering / Data Engineering
Solutions Architecture
Cloud Architecture / Cloud Security
Data Strategy & Architecture / Data Center Ops
Hybrid-Cloud / Multi-Cloud
AI Automation / Machine Learning
Cybersecurity / Cyber Intelligence
Network Development
Development Operations
Project & Product Management