Best Practices in Implementing Secure Microservices Architecture
Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development approaches such as Development Operations. Security needs to be embedded into these software development approaches. This presentation based on CSA research artifact 'Best Practices in Implementing Secure Microservices Architecture' will help to identify best practices in securing microservices in the engineering of trustworthy secure systems through the lens of the Developer, Operator, and Architect.
Live onlineMay 277:30 amUTC
or after on demand30 mins
Your place is confirmed, we'll send you email reminders
Given that many countries have been suffering from a dire shortage of IT professionals for many years and the demand for IT professionals has continued unabated. The panel hopes to address the challenge of having enough cybersecurity professionals and discuss what employers can do to build necessary working experience for the individuals.
As organizations migrate to the cloud, they need information security professionals who are cloud-savvy. The Certificate of Cloud Security Knowledge (CCSK) is widely recognized as the standard of expertise and provides an individual with the foundation they need to secure data in the cloud. Learn how CCSK can bridge the gap and provide an important first step in establishing baseline knowledge for individuals in cloud security.
"A Call to Action with CSA Vietnam Chapter” [in Vietnamese language]
Philip Cao HUNG (Advisor, CSA Vietnam Chapter)
Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development approaches such as Development Operations. Security needs to be embedded into these software development approaches. This presentation based on CSA research artifact 'Best Practices in Implementing Secure Microservices Architecture' will help to identify best practices in securing microservices in the engineering of trustworthy secure systems through the lens of the Developer, Operator, and Architect.
A new Guidance for Cloud Native Security was approved by the Singapore Information Technology Standards Committee in 2020. This speaker will provide an analysis on the strengths and weaknesses of the said technical reference. He will make a comparison with NIST and other papers on the same topic.
Ronald TSE, CEO, Ribose & Co-Chair, CSA DevSecOps Working Group
The CSA DevSecOps working group has published a number of papers including Reflexive Security, DevSecOps, and associated best practices. This talk briefly describes these topics, with an explanation of the principles and benefits of the novel management framework around DevSecOps, presented with examples of best practices that fit into this framework. We also provide a roadmap of current research of the working group.
Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working from anywhere they want. The rapid increase in global IP traffic have challenged network service providers to scale and improve infrastructure to meet this new demand. We explore the merits and performance of Software Defined Perimeters to withstand DDoS attacks in multiple network implementations including hybrid cloud applications, network function virtualization and software defined networks.
OSAS is a recently released open-source security intelligence toolset that leverages machine learning and other innovative technologies aimed at discovering anomalies in a given dataset. The tool implements and combines several of the Adobe Security Intelligence Team’s previous research, white papers, and other open-source projects. OSAS is able to run “out-of-the-box” and enables researchers to: (a) experiment with data sets; (b) control how the data set is processed and how the features are combined; and (c) can help shorten the path to finding a balanced solution for detecting security threats.
This webcast will introduce folks to OSAS, its potential benefits and uses in their own threat intelligence efforts, and how they can obtain the latest builds of the project and contribute to it if they choose.
TJ Gonen, Head of Cloud Product, Check Point Software Technologies
Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance and best practices on how to build in security without impeding agility.
Jon Moore, Chief Risk Officer and SVP Consulting Services, Clearwater
Seeking flexibility, scalability, and cost-savings, an increasing number of healthcare organizations are
moving systems and data to the Cloud. Fueled by increased adoption of telemedicine and wearable
medical devices sparked by the pandemic and continuing investment and growth in Cloud-native health IT startups, the market for healthcare cloud computing is expected to grow from $28 billion in 2020 to nearly $65 billion over the next six years, according to a recent study by MarketDigits.
While there are numerous benefits for healthcare organizations that adopt cloud models, introducing
sensitive and protected data into the Cloud creates various new risks. As we’ve seen in some surveys, organizations are conflicted on whether cloud security makes it easier or more challenging to manage these risks. A recent Netwrix survey indicated that nearly 40% of respondents have had a cloud security incident in the past year, and nearly half of them could not diagnose the issue.
During this webinar, Clearwater Chief Risk Officer and Head of Consulting Services Jon Moore will review recent examples of healthcare cloud security failures and discuss critical takeaways that organizations should note to avoid similar missteps.
Attendees will learn:
· Seven ways cloud security can go sideways resulting in a breach and HIPAA violation
· Best practices to help your organization reduce risk and avoid a HIPAA violation in the Cloud
Ningjing Gao, Principal Technical Program Manager - Security Team, Adobe
If you are part of a security organization and noticing the constant resource competing with product feature development, you may have wondered how to further accelerate security work assigned to product teams. How can security best integrate with feature development to reserve engineering resources for security projects? Our team has developed an approach to provide clearer visibility into the security work that needs to be done. It also enabled us to be better aligned with the existing product development process.
In this webcast we Ningjing Gao, Principal Technical Program Manager for Security at Adobe, will talk about what we did to improve our processes and shared additional best practices that can help you make it more efficient and effective for product teams to build security into everything they do at your organization.
Willy Leichter, VP-Marketing and Product Strategy & Shauntinez Jakab, Sr Dir-Product Marketing and Analyst Relations, Virsec
As attacks on software supply chains and critical applications not only continue but accelerate, we need to extend a next-generation zero-trust model into cloud workloads during runtime. To understand why runtime remains a choice target for threat actors, look no further than the recent SolarWinds and Microsoft Exchange server attacks. Both exploits executed undetected and undeterred in runtime, easily evading existing security measures such as threat hunting and EDR/EPP tools.
Zero trust is a powerful concept, but many think it only applies to users, devices, and networks. Implementing a next-generation Zero-Trust model, one that incorporates application-aware workload protection, can ensure that only the right code and processes can execute, regardless of the threat environment.
In their Market Guide for Cloud Workload Protection Platforms, Gartner specifically recommends extending zero trust security, stating: “At runtime, replace antivirus-centric strategies with “zero-trust execution.”
Join security experts from Virsec as they discuss the challenges of protecting an expanding attack surface area with cloud, hybrid, and container environments and detail the need for application-awareness and effective runtime protection. Get best practices for security implementations for workloads that ensure vulnerability protection with granular application control, system integrity assurance, and advanced memory protection at runtime.
Anton Chuvakin of Google Cloud & Edward Smith and Vijit Nair of Corelight
If cloud environments are locked down by default and everything is already being logged, is cloud network traffic analysis really helpful? It turns out that even in the cloud, network telemetry data can ensure investigations are fast and hunts are conclusive. As we’ve learned from breaches like Sunburst, network telemetry provides essential evidence for catching threats other tools miss.
Join experts from Google Cloud Security and Corelight to learn how collection and analysis of cloud network traffic leads to better threat detection and response. We will discuss:
- Common misconceptions about network telemetry
- Cloud traffic monitoring use cases
- Solutions to implementation challenges
As the world changes, third-party risk management requirements change too. So, what can you expect in 2021? How can you prepare for what’s ahead? We’ve helped implement thousands of third-party risk management programs, and in doing so, we’ve seen how organizations’ needs have evolved. There are proactive measures you can take to stay ahead of the curve. But in order to execute against and adapt to these third-party risk trends, you need to first know what the future holds. In this session, we’ll answer the following questions:
What are the latest trends for third-risk management?
How your organization adapt to current and future trends?
What can you do to future-proof your third-party risk management program?
Where can you go to keep up-to-date with new third-party risk trends as they emerge?
Associations and trade unions asked the judge of the "Conseil d'État, the highest French administrative court - to suspend the partnership between the Ministry of Health and Doctolib, arguing that the hosting of vaccination appointment data by the subsidiary of an American company posed risks with regard to access requests by the American authorities.
This recent ruling by the supreme administrative court of justice could provide some guidance on developing a legal framework and establishing some technicals controls that could protect them from the long arm of European regulators and the fine they might levy - Some light at the end of the Tunnel for DPO and Cloud Service Provider (CSP) ?
A quick review of the importance of Cloud adoption and its impact in the Financial Sector, barriers and opportunities. Focus on the regulation requirements and particularly on what would be necessary in relation with the future Cloud Certification Scheme proposed by ENISA.
The cloud is more dynamic now than ever before. How do you keep up with development while thwarting off threats? Learn how to fend off threats and turning security into an enabling force behind enterprise digital transformation.
If you think that you are doing encryption right while remaining compliant with regulations like GDPR, you might be wrong. In this talk Frederik will cover various encryption controls including an application layer encryption approach that incorporates zero-trust principles for data access. If you are worried about your sensitive data staying safe in the cloud, this talk is for you.
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa