Hi [[ session.user.profile.firstName ]]

Rethinking Security for Digital Transformation

Digital transformation isn’t coming--it’s here. ZeroNorth surveyed cybersecurity professionals across a range of industries to get their input on effectively managing risk across applications and infrastructure in this age of digital transformation. Join ZeroNorth CTO John Steven and vice president of marketing Dave Howell as they discuss the findings of the survey.
Recorded Oct 11 2019 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Steven, CTO, ZeroNorth; Dave Howell, vice president of marketing, ZeroNorth
Presentation preview: Rethinking Security for Digital Transformation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Driving Secure DevOps with ZeroNorth (live 20-min demo: 10/28 @ 1pm ET) Oct 28 2020 5:00 pm UTC 21 mins
    The ZeroNorth team
    Join us to learn how ZeroNorth can bring continuous, end-to-end security to DevOps and enable comprehensive application security. In this 20-minute webinar you'll see via a live demo how ZeroNorth is the only platform that enables you to:

    •Minimize noise by correlating and prioritizing application vulnerabilities
    •Reduce costs by consolidating the management of existing scanning tools (e.g., SCA, SAST/DAST, container management, pen testing
    •Implement consistent vulnerability discovery and remediation
    •Gain continuous visibility of risk throughout the software development life cycle
  • CISO Perspective: The Economics of Software Quality and Security Recorded: Oct 20 2020 48 mins
    Jim Routh, Head of Enterprise Cyber Security at MassMutual, ZeroNorth CTO John Steven
    Here’s a fact. Higher quality software drives higher productivity. It also lowers the total cost of IT ownership and offers considerable economic benefit to the enterprise, whether it’s software needed to run the business, or to sell to customers. Quality problems become security issues: today’s bugs become tomorrow’s vulnerabilities. And security issues become quality problems: bypassing security processes enables malicious script injections into otherwise quality code. CISOs are chartered with championing cybersecurity regardless of which team across the enterprise is producing software. Likewise, the focus on software quality is organizationally agnostic. In short, this means CISOs are ideally suited to help organizations orient security in the name of software quality.

    In this session, Jim Routh, Head of Enterprise Cyber Security at MassMutual and ZeroNorth CTO John Steven will discuss the economics and relationship of software quality and security, and the role of the CISO in facilitating this across the organization.
  • Simon Data: Scaling AppSec for an Enterprise SaaS Platform Recorded: Oct 12 2020 41 mins
    Robert Wood, Chief Information Security Officer, Simon Data
    When you’re in the business of delivering an enterprise customer data platform, enabling comprehensive application security for fast engineering teams is a must. And, at Simon Data, chief information security officer Robert Wood sees the security of the Simon Data platform as a competitive advantage. In this webcast, we’ll pose 10 questions to Robert, and learn how he and his team leverage a combination of AppSec automation, open source security scanning tools and vulnerability correlation to build a repeatable and scalable security testing program.
  • Bridging the Gap Between AppSec and DevOps to Reduce Security Risk Recorded: Oct 1 2020 57 mins
    Dr. Larry Ponemon, ZeroNorth CEO John Worrall, ZeroNorth SVP Engineering Christian van den Branden
    Organizations are at risk when application security (AppSec) and DevOps teams don’t have a common vision for delivering software capabilities required by the business — securely. This is now truer than ever, as digital transformation puts pressure on organizations to develop applications at increasing speeds, potentially putting their security at risk. Yet, according to a new Ponemon Institute research report, sponsored by ZeroNorth, 75% of AppSec practitioners and 49% of developers believe this “cultural divide” exists between their respective teams.

    In this webinar, Dr. Larry Ponemon, ZeroNorth CEO John Worrall and Christian van den Branden, SVP of Engineering at ZeroNorth offer their unique perspectives on the “Revealing the Cultural Divide Between Application Security and DevOps” research results, as well as the five steps Ponemon Institute recommends organizations take to help bridge this critical cultural divide.
  • Strengthening Software Security – An Engineering-Led Product Security Program Recorded: Apr 16 2020 27 mins
    Bidpath CTO Francis Juliano
    10 questions for Bidpath CTO Francis Juliano

    For Bidpath, the world’s leading global auction software platform, software security is critical to both the business and the company’s global customer base. As Bidpath embarked upon a journey to strengthen its software security program, CTO Francis Juliano needed a solution to better manage disparate security scanning tools, deliver a consolidated view of risk, and simplify remediation - without the need for extensive resources from the engineering team.

    Join us for a virtual “fireside chat” with Francis as we discuss Bidpath’s software security strategy, challenges the company hoped to overcome, and how ZeroNorth empowers Bidpath engineering to drive security without sacrificing speed of development.
  • Application Security Virtual Roadshow: Best Practices vs Practicality Recorded: Apr 7 2020 60 mins
    Panelists: Chris Wysopal, Veracode, Casey Ellis,Bugcrowd, John Steven, ZeroNorth, Luis Jimenez,Optiv
    Establishing an application security program is an ongoing process – there are always steps you can take to improve your program. Join us for our virtual roadshow where Veracode CTO, Chris Wysopal, will be teaming up with Bugcrowd CTO, Casey Ellis, ZeroNorth CTO, John Steven and Optiv Director of Threat Management, Luis Jimenez for a one-hour panel discussion on best practices for maturing your AppSec program. And, if you’re just starting your AppSec journey, our experts will also be providing some practical first steps you can take that will prepare your AppSec program for improvements in the future.
  • Bringing DevSecOps to Industrial Control Systems Recorded: Nov 13 2019 32 mins
    Aaron Wise, Director of Engineering, ZeroNorth
    Bringing industrial control systems and critical infrastructure into the modern age will require more than just software updates. It’ll require continuous software updates. The challenge is that every time new updates to software powering applications or infrastructure are introduced, so too is the potential for new vulnerabilities. Every little change of code creates the potential for a new vulnerability that attackers can exploit, and the demand for updates to be delivered faster and faster only increases the security challenges. Any business that relies on software as a competitive differentiator – in other words, every business today – is facing this issue and trying to figure out ways to deal with it. But for industrial control systems (ICS) that are already playing catch-up and trying to adapt to a connected world, these challenge will be that much more daunting.

    This webinar will provide an overview of DevOps and DevSecOps cultures to help the people using and managing ICS understand how these practices fit into their organizations. It will empower those tasked to secure critical infrastructure with the knowledge they need to ensure that comprehensive discovery and remediation of software vulnerabilities are in place so they can proactively manage risk.
  • Rethinking Security for Digital Transformation Recorded: Oct 11 2019 26 mins
    John Steven, CTO, ZeroNorth; Dave Howell, vice president of marketing, ZeroNorth
    Digital transformation isn’t coming--it’s here. ZeroNorth surveyed cybersecurity professionals across a range of industries to get their input on effectively managing risk across applications and infrastructure in this age of digital transformation. Join ZeroNorth CTO John Steven and vice president of marketing Dave Howell as they discuss the findings of the survey.
  • End-to-End Vulnerability and Risk Management Across the Enterprise Recorded: Aug 14 2019 44 mins
    Brian McGraw, Global Head of Advisory Services, CyberProof, a UST Company; John Steven, CTO, ZeroNorth
    Digital transformation is redefining organizations in all industries into software-centric businesses. Assessing, planning and implementing vulnerability management across your organization is therefore crucial. In this webinar, CyberProof, a UST Global company, and ZeroNorth will share details on the companies’ integrated solution and discuss how customers are benefitting from end-to-end vulnerability & risk management across the enterprise.
  • Why Security Must Be Part of the Software Life Cycle Recorded: Jul 31 2019 47 mins
    Michael Osterman, Principal Analyst, Osterman Research
    As businesses embark on digital and cloud transformation to accelerate velocity and improve operational efficiencies, security just is not keeping pace. Virtually every business relies on software to keep it running, to keep it competitive. Simultaneously, application vulnerabilities are escalating, and breaches are common C-suite conversations. The current approach to application security relies on multiple security tools deployed at different layers of the software development life cycle, returning volumes of results. This taxes already understaffed application security and SecOps teams, who are challenged to make sense of it all, to address the vulnerabilities and to convey the full risk picture to the business.

    In the webinar, Michael Osterman, Principal Analyst, Osterman Research, will discuss:

    - Why the current approaches to security management are no longer adequate as the pace of business accelerates.
    - The key steps to mitigate risk, including identifying, prioritizing and remediating vulnerabilities continuously.
    - Why security should be part of the software development process and at all points in the software lifecycle.
    - How prioritizing vulnerabilities properly can reduce risk
  • 20-Minute Speed Demo: Orchestrate Application and Infrastructure Security Recorded: Jun 19 2019 23 mins
    ZeroNorth Team
    In just 20 minutes, see how ZeroNorth can help you orchestrate risk management across applications and infrastructure.

    Join us for a quick-hit online demo—In less than half an hour, we’ll show you how ZeroNorth is the only platform that enables you to:

    • Minimize noise by correlating and prioritizing vulnerabilities across apps and infrastructure
    • Reduce costs by consolidating the management of existing scanning tools (e.g., SCA, SAST/DAST, container management, pen testing, network scanning)
    • Implement consistent vulnerability discovery and remediation
    • Gain continuous visibility of risk throughout the software development lifecycle

    We look forward to seeing you on June 19!
  • Zerto Gains One Source of Truth for Risk, Compliance & Vulnerability Management Recorded: May 15 2019 46 mins
    Rob Strechay, SVP of Product and Raz Oliar, CISO, Zerto; John Steven, CTO, ZeroNorth
    Securing the value stream is becoming a priority for most organizations. Validating the security posture of the companies who supply technology is now standard business practice. IT Resilience platform provider Zerto has over 6,000 customers across more than 70 countries. It’s critical that they ship secure software and have a continuous view of risk and compliance to ensure they meet customer and regulatory requirements. Additionally, Zerto has a very dynamic development environment with over 200 engineers, 12 different sites and over 100 different SaaS services. They work in a true CI/CD environment and their infrastructure changes daily, so they have to be agile.

    In this webinar, learn from Zerto’s SVP of Product and its CISO how using the ZeroNorth security orchestration platform allows them to:

    •Consolidate disparate tools to achieve “one source of the truth” of security posture.
    •Identify and remediate critical vulnerabilities quickly to meet internal SLAs.
    •Ensure the compliance audit process is accomplished more efficiently and is ready for future growth.
  • DevSecOps from Cradle to Scale: Real-World Lessons and Success Cases Recorded: Apr 15 2019 42 mins
    Dr. Chenxi Wang
    Many businesses today are harnessing the tools and promise of DevOps or Agile to drive innovation. Everything from new website capabilities to entirely new products are fair game in this revolution. However, the majority of security tools and processes are not inherently designed to be integrated in this new world, which is limiting the results new developments can bring.

    In this webinar, Dr. Chenxi Wang, Founder & General Partner, Rain Capital and member of Board of Directors of OWASP will discuss:
    • How to effectively integrate security into your DevOps process
    • How to integrate it at scale
    • Real-world examples of business results using this approach

    Chenxi will also cover where to get started with "DevSecOps," what metrics to use and what security at scale can mean for businesses.

    Guest Presenter:
    Dr. Chenxi Wang is the founder and general partner of Rain Capital, an early stage cyber security-focused venture fund, and member of the Board of Director of OWASP. Previously, she was the co-founder of the Jane Bond Project, a cyber security consultancy.
  • Collaborative Defense—Bringing Business & Security Together for Resiliency Recorded: Feb 20 2019 38 mins
    Mike Brown, RADM, USN (Ret), former Dir. Cybersecurity Coordination for DHS & DOD; Ernesto DiGiambattista, CEO, ZeroNotht
    Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration are topical, consistent themes, reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?

    Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.

    Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.

    Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
  • Getting Started with DevSecOps Recorded: Jan 10 2019 31 mins
    Andrei Bezdedeanu, VP of Engineering, ZeroNorth
    Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. The challenges associated with adoption can be mitigated by empowering developers with the appropriate security tools and processes, automation and orchestration.

    In this video, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits, including the delivery of more secure applications, lower cost of managing your security posture and full visibility into application and enterprise risks. He will also review the challenges, enablers and benefits to DevOps and DevSecOps and review key concepts such as DevOps vs SecOps and automation and orchestration.

    You will learn:
    • How to seamlessly automate and orchestrate security across the entire SDLC.
    • The foundation of DevSecOps, and the application development and deployment processes.
    • How to remove the cultural differences between DevOps and SecOps teams to make way for collaboration.
Uniting security, DevOps and the business for the good of software.
ZeroNorth brings security, DevOps and the business together to improve application security performance and reduce organizational risk. The company’s application security automation and orchestration platform unites enterprises to rapidly identify, prioritize and remove the vulnerabilities standing in the way of software excellence. In an age where the security of applications needs to be everyone’s responsibility, ZeroNorth is where organizations come together for the good of software.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Rethinking Security for Digital Transformation
  • Live at: Oct 11 2019 5:00 pm
  • Presented by: John Steven, CTO, ZeroNorth; Dave Howell, vice president of marketing, ZeroNorth
  • From:
Your email has been sent.
or close