How to Modernize Your Azure Journey with DevSecOps Princples

Presented by

Surag Patel Chief Strategy Officer at Contrast Security, Steven Murawski

About this talk

Whether you have been on the cloud journey for 5 months or 5 years, over 75% of enterprises are still encountering a variety of architectural and security challenges when migrating legacy applications to the cloud, developing and delivering cloud-native applications, or managing hybrid and multi-cloud environments. Some of these hurdles include understanding dependencies between applications and application components, refactoring application security infrastructure for cloud hosting, and securing the API proliferation. During this fireside chat, Contrast Security and Microsoft will discuss how CIOs, CTOs, CISOs, and Chief Cloud Architects can overcome many of these obstacles and maximize cloud efficiencies by implementing DevSecOps principles. Specifically, they will cover how using DevSecOps can help you better: · Understand risk in your applications as you migrate to the cloud · Rebuild/refactor applications for cloud hosting · Secure production workloads once applications are deployed in the cloud · Manage application workloads across hybrid and multi-cloud environments

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (22)
Subscribers (4765)
Contrast Security is the leader in next-generation application security, embedding code vulnerability analysis and attack prevention directly into software through instrumentation. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improving efficiencies and cost, and enabling rapid scale while protecting applications from known and unknown threats.