Crawl, Walk, Run: Operationalizing IaC Security

Logo
Presented by

Jonathan Bregman, Sr. Product Marketing Manager & Steve Giguere, Developer Advocate, Prisma Cloud, Palo Alto Networks

About this talk

Infrastructure as code (IaC) is the key to embedding cloud security earlier in the development lifecycle. In practice, adopting and implementing an IaC security program is a complex and iterative process – especially for large organizations. Your IaC security program path will depend on your current tooling and workflows, security and compliance requirements, and resources. And your IaC security rollout strategy should be deliberate, iterative, and measurable. If you’re ready to get started with IaC security but aren’t sure where to start or if you’re in the process of adopting IaC security and need a strategy customized to meet your needs, this webinar is for you. Join us as we walk you through how to roll out and operationalize an IaC security program based on your end goals and scale. You’ll also get best practices and milestones for each phase of your program rollout so you can optimize your IaC security program for efficiency and help your organization adopt a secure-by-default culture.

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (884)
Subscribers (55251)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa