InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Myths and Best Practices of Security by Design

Presented by

​Mel T. MIGRINO (VP and Group CISO, Meralco)

About this talk

With the new normal continuously shaping, organizations are moving rapidly to migrate to the cloud to achieve business agility and resilience. However, cloud migration and cybersecurity are efforts taken separately. Thus, a shift left approach to secure applications is crucial to implement security measures during the entire development lifecycle. Shifting security to be left aims to adopt the principles of security by design with security best practices built in, and to detect and address security issues and vulnerabilities as early as the initial stages of the development cycle.
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80654 subscribers1017 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics