Cloud-Native Security: Understanding the Why and How

Presented by

David M. Zendzian, CTO, at Pivotal and Jeff Williams, Co-founder and CTO at Contrast Security

About this talk

The latest Verizon Data Breach Investigations Report continues to confirm that top sources of data breaches continue to be at the application layer. DevOps and security teams are adopting modern, fully automated software delivery platforms to release apps to production environments multiple times a week or even daily. This has forced security teams to rethink the traditional processes and practices to make security a key component of their cloud-native transformation. Join Jeff and David to learn how enterprises are addressing cloud native application security at speed and scale. This session will cover: - Common security anti-patterns - What is Cloud-Native Security? - People: How to align Dev, Security and Ops teams to achieve Cloud Native Security - Process: How does Cloud Native change security processes to support the modern agile business? - Technology: Introducing Cloud Native Security tools to achieve continuous application security - Q&A This is the first webinar in a series presented by Pivotal and Contrast Security on Cloud-native Security best practices

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (22)
Subscribers (4756)
Contrast Security is the leader in next-generation application security, embedding code vulnerability analysis and attack prevention directly into software through instrumentation. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improving efficiencies and cost, and enabling rapid scale while protecting applications from known and unknown threats.