Hi [[ session.user.profile.firstName ]]

Automated Security for DevOps

Data Theorem delivers automated security for DevOps, ushering in a new era of DevSecOps. This helps teams grow faster with fewer application security exposures.
Recorded Jan 15 2020 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Data Theorem
Presentation preview: Automated Security for DevOps

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Protect Application Attack Surfaces Sep 22 2020 5:30 pm UTC
    Himanshu Dwivedi, CEO, Data Theorem
    Himanshu Dwivedi, Data Theorem’s CEO, will show how you can build a comprehensive security program that will automate key security policies across your entire data environment to receive critical alerts before your data is exposed. Using a recent example of a data leak caused by a basic misconfiguration, we discuss how it can be avoided.
  • Managing AppSec Compliance at Provident Credit Union Sep 22 2020 5:00 pm UTC
    Richard Smith (Data Theorem) & John Haggarty (Provident Credit Union)
    Data Theorem customer, Provident Credit Union, discusses how they use Data Theorem to enforce their security policies for their banking app managed by their 3rd party vendor. They share how they remain compliant, protect customer data, and have 24/7 access to security reporting for audits.

    Speakers:
    Richard Smith, Field Director, Data Theorem
    John Haggarty, VP of Marketing and Digital Experience, Provident Credit Union
  • Identify Third Party Trackers in Apps Sep 22 2020 4:15 pm UTC
    Himanshu Dwivedi, CEO, Data Theorem
    Learn how third party trackers are hurting respectable brands by inadvertently sharing data about their customers with third parties without proper consent. Explore a technical deep dive on the security implications of this with regard to open source libraries and SDKs and how this can lead to serious data compliance violations. Then learn how to discover potential trackers in your apps and how to remediate potential vulnerabilities.
  • Protect web apps from XSS exploits Sep 22 2020 3:45 pm UTC
    Himanshu Dwivedi, CEO, Data Theorem
    Learn how implementing a few simple headers across sensitive cookies will help prevent XSS attacks from being exploited. We'll also cover how you can do this across hundreds of web apps to make sure any vulnerabilities aren't exploited at scale.
  • The Future of FinTech AppSec Is Brighter Than You Think Sep 22 2020 3:00 pm UTC
    Himanshu Dwived (Data Theorem), Erick Lee (Intuit), Jeremiah Kung (East West Bank) & Karthik Rangarajan (Robinhood)
    Data Theorem CEO, Himanshu Dwivedi, interviews customers from RobinHood, Intuit, and East West Bank to discuss what is working with their AppSec programs, how to manage agile teams and how to maintain a proactive security approach.

    Speakers:
    Himanshu Dwivedi, CEO, Data Theorem
    Erick Lee, Director of Security, Intuit
    Jeremiah Kung, Global Head of Digital Cybersecurity, East West Bank
    Karthik Rangarajan, Security Lead, Robinhood
  • How to Prevent Data Loss With Full Stack Analysis Sep 22 2020 2:30 pm UTC
    Karen Horovitz, Senior Product Marketing Manager, Data Theorem
    In this session we cover how a popular mobile payments app recently exposed 7 million private banking records & is now facing fines and brand damage, as well as the security risks associated with using cloud provider building blocks for running client-facing apps.
  • How modern data breaches attack every layer of the application stack Sep 22 2020 2:00 pm UTC
    Doug Dooley, Chief Operating Officer, Data Theorem
    Review key findings from Verizon's 2020 Data Breach Incident Report (DBIR), which details how modern attacks target multiple layers in the application stack from web to APIs to the cloud. Examine real-world examples such as Capital One, 63Red, BHIM. Learn how to prevent similar attacks.
  • Contact Tracing 101 Recorded: May 4 2020 13 mins
    Alban Diquet, Head of Engineering at Data Theorem
    How does contact tracing work?

    The current health crisis has forced countries to consider the use of mobile contact-tracing to track and control the spread of the virus. This video provides an introduction to this strategy, the proposed use, and initial implications on privacy and mobile security.

    -What is contact tracing?
    -Technical Implementation in China and South Korea
    -Technical Implementation in the Apple/Google proposal
    -Alternative options to protect data while saving lives
  • Security Automation on AWS Recorded: Mar 19 2020 19 mins
    Felicia Haggarty and James Galt, Data Theorem
    How can we prevent data breaches that are caused by very simple processes like closing an AWS bucket?

    The crown jewel of DevSecOps is not only identifying vulnerabilities and analyzing them, but being able to resolve them before there is a breach. Automating this last step solves several problems:

    *Less exposure time means less chance of breach
    *Saves time fixing the violation or learning how to fix it
    *Developers need not get involved with every security incident

    In this session, we will show you an example of a customer that had an unauthenticated queue on AWS, how it was resolved, and how these failed attacks extend their cloud security posture.
  • How to Automate Mobile AppSec without the Staff Recorded: Feb 11 2020 33 mins
    Richard Smith, Director at Data Theorem
    Overcoming the challenges of manual mobile AppSec with automation.

    The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition. Consequently, developers have introduced new models to develop mobile apps quicker and easier.

    In these fast-paced development cycles, the risk of data security vulnerabilities and breach of regulatory requirements becomes more important than ever. With such an industry trend comes an imperative need to innovate the approach to mobile AppSec.

    Join us to learn about the:

    *Top challenges and problems facing security teams for mobile AppSec.
    *Limitations of traditional mobile AppSec approaches and why a manual processes will not scale with DevOps.
    *Ways to automate your mobile AppSec program to meet the fast pace demands of modern SDLCs without the staff.
  • How Hackers Hack Your APIs in 15 Minutes or Less Recorded: Jan 31 2020 19 mins
    Himanshu Dwivedi, CEO at Data Theorem
    It is very hard, if not impossible, to secure something you don’t know exist. While security professionals spend countless hours on complex yet interesting issues that *may* be exploitable in the future, basic attacks are occurring every day with little to reviews. For example, a “dated trend” by effective yet lazy hackers is to search for API unknown by security teams, coined “Shadow APIs”, connect to these APIs, and extract data. While SQL Injection used to be the hack of choice, as a few simple SQL commands would either mean “pay dirt” or “move on to the next target”, the same can be said for Shadow API….Find, Connect, Extract. This talk will discuss one of many methods that are used in the wild to target Shadow APIs and export large volumes of data with a few clicks of a button (lines of code in python code :). Attendees will learn about a very basic yet non-so-obvious problem in securing data, and how hackers are using creative methods to steal large volumes of data.
  • Automated Security for DevOps Recorded: Jan 15 2020 2 mins
    Data Theorem
    Data Theorem delivers automated security for DevOps, ushering in a new era of DevSecOps. This helps teams grow faster with fewer application security exposures.
  • Did You Know CCPA Has Already Begun? Recorded: Dec 10 2019 26 mins
    Richard Smith, Director, Data Theorem
    How to prepare your data, mobile apps, web apps, and APIs

    On January 1, 2020, the California Consumer Privacy Act (CCPA) will go into effect. This new privacy law emphasizes the growing importance for companies to revisit their approach on how they handle consumer data. Recent GDPR violations have shown that exposure via poor mobile app security and leaky APIs can result in multi-million dollar fines. But security leaders may not be aware that consumers will be able to make requests to in-scope business for the 2019 calendar year. Learn how to prepare for this legislation, security audits, and future data privacy laws without the staff.

    In this webinar we will cover :

    *How this legislation affects your company and customer data
    *How it impacts your mobile and modern web app strategy
    *How you can start preparing your current data, apps, and API’s before the law goes into effect
  • How to Leverage iOS 13 for App Security Recorded: Nov 19 2019 27 mins
    Phillip Tennen, iOS Software Engineer, Data Theorem
    Get briefed quickly on the latest security changes on iOS 13.

    Led by Phillip Tennen of Data Theorem, the webinar explores some important changes landing with iOS 13 this fall. The webinar will discuss new encryption APIs that make it easier to securely and correctly encrypt data, new requirements for data collection, system-level changes into the availability and visibility of user tracking, and so much more. The webinar will close with the the new services Apple is bringing forward that can be leveraged in your applications to deliver a smooth and more secure experience to your users.

    In this webinar you will learn about:

    *New APIs for securing data and changes to existing frameworks in iOS 13
    *New limits placed on data collection
    *New options for visualizing the data collected by apps
    *New system services that enhance user security
    *Changing requirements for an app's security posture
  • Automate Compliance Audits without the Staff Recorded: Nov 14 2019 29 mins
    Himanshu Dwivedi, CEO
    How to deliver continuous compliance for APIs and mobile apps.

    With so many consequential data breaches in the past decade, data security and privacy are top of mind issues for security leaders and corporate boards. Numerous government and industry regulations like HIPAA, PCI, GDPR, and FERPA are designed to focus attention on securing data and keeping personal information private. Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation.

    Join us to learn about the:

    Challenges of manual compliance audits and their inability to keep pace with modern software development (CI/CD, DevOps, Agile).
    Benefits of automating continuous security compliance testing and reporting to meet the demands on regulators, partners and customers.
    Successful augmentation of an in-house security team by replacing expensive outside consultants.
  • How to Leverage iOS 13 for App Security Recorded: Oct 30 2019 27 mins
    Phillip Tennen, iOS Software Engineer, Data Theorem
    Get briefed quickly on the latest security changes on iOS 13.

    Led by Phillip Tennen of Data Theorem, the webinar explores some important changes landing with iOS 13 this fall. The webinar will discuss new encryption APIs that make it easier to securely and correctly encrypt data, new requirements for data collection, system-level changes into the availability and visibility of user tracking, and so much more. The webinar will close with the the new services Apple is bringing forward that can be leveraged in your applications to deliver a smooth and more secure experience to your users.

    In this webinar you will learn about:

    *New APIs for securing data and changes to existing frameworks in iOS 13
    *New limits placed on data collection
    *New options for visualizing the data collected by apps
    *New system services that enhance user security
    *Changing requirements for an app's security posture
  • How Low-Tech Hackers Hack Your APIs in 15 Minutes or Less Recorded: Oct 23 2019 19 mins
    Himanshu Dwivedi, CEO at Data Theorem
    It is very hard, if not impossible, to secure something you don’t know exist. While security professionals spend countless hours on complex yet interesting issues that *may* be exploitable in the future, basic attacks are occurring every day with little to reviews. For example, a “dated trend” by effective yet lazy hackers is to search for API unknown by security teams, coined “Shadow APIs”, connect to these APIs, and extract data. While SQL Injection used to be the hack of choice, as a few simple SQL commands would either mean “pay dirt” or “move on to the next target”, the same can be said for Shadow API….Find, Connect, Extract. This talk will discuss one of many methods that are used in the wild to target Shadow APIs and export large volumes of data with a few clicks of a button (lines of code in python code :). Attendees will learn about a very basic yet non-so-obvious problem in securing data, and how hackers are using creative methods to steal large volumes of data.
  • Kids, Privacy, and Apps Recorded: Sep 11 2019 23 mins
    Himanshu Dwivedi, CEO at Data Theorem
    Everyday we read headlines about data breaches and data privacy, but how can we start being pro-active about managing data privacy in apps for us and our kids? We have some guidelines to share with you, as well as a quick demo to show you some tools you can use now and discuss how companies should be safeguarding data.

    In this webinar we will cover:

    *How you can start securing your mobile data today
    *What kinds of data put you at risk (location data, personal information, photos)
    *How we look at app privacy as a company, as well as parents
  • Serverless vs Containers: A Case Study Recorded: Aug 28 2019 30 mins
    Alban Diquet, Head of Engineering at Data Theorem
    See the results from Data Theorem’s head-to-head experiment on building and securing real-world microservices.

    Join Alban Diquet, Head of Engineering at Data Theorem, as he discusses how Serverless performed versus Containers in a head-to-head experiment. Data Theorem implemented a back end component to compare each technology to determine which is better in several key areas that critical are for developers. This webinar will showcase what Alban and his engineering team discovered in this experiment, which should help you make your own determination of what's best for your organization.

    Specifically, you'll learn:

    *Which was better in terms of developer experience
    *How each performed with regard to cost
    *Which has the best opportunities for scale
    *What to consider in terms of security
  • How to Automate an API Security Program Recorded: Aug 14 2019 23 mins
    Doug Dooley, COO, Data Theorem
    Learn the prominence of APIs in today’s landscape and how to build an API security framework.

    Join Doug Dooley, COO at Data Theorem, as he discusses the pressing need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data from potential threats.

    Specifically, you'll learn:

    *The prominence of APIs in today's landscape
    *About the challenges of securing APIs
    *How to create an API security framework
    *Why automation is the key
API, app, mobile, and cloud security best practices
Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automated Security for DevOps
  • Live at: Jan 15 2020 6:25 pm
  • Presented by: Data Theorem
  • From:
Your email has been sent.
or close