Best Practices for Securing Modern Cloud Native Application with ActiveCampaign
The benefits of cloud native development are undeniable – from rapid deployments to scaling operations. However, modern cloud native applications both solve and introduce new security risks at each layer of the application.
Join Chaim Mazal, ActiveCampaign CISO, as he shares his experience in the cloud native space and offers tips for others. Mazal will discuss how he transformed ActiveCampaign’s security approach at each layer of stack – including 3rd dependencies, containerization, and infrastructure as code. Join us to learn the key strategies and unique insight for securing cloud native applications.
RecordedMar 9 202158 mins
Your place is confirmed, we'll send you email reminders
Automating security has become fundamental to supporting the speed-to-market requirements of modern application development environments. In this video, you will hear from the security teams at Skyscanner and Red Venture on how they are automating application security as part of their application development environments, thus helping their development teams to prioritize and remediate vulnerabilities more effectively.
___________________________________________
Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.
As more organizations leverage cloud native technologies such as Kubernetes, IaC, containers and serverless – shifting left and adopting DevSecOps is a must-do. But how does it actually work in practice?
Meet Twilio; a billion dollar unicorn that has mastered dev-first security. In this session, you’ll hear from Twilio’s Head of Product Security on how he built and runs an application security program that maintains high velocity outputs.
You’ll learn about everything from their security champions program; developer threat modeling training; to their dev-friendly security tooling choices.
___________________________________________
Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.
At Snyk, we pride ourselves on being developer-first, so when we noticed Red Hat’s deep investment in the developer experience for OpenShift, we knew we wanted to be a part of that.
Snyk’s “developer-first” security solution empowers developers to quickly find and remediate security vulnerabilities and license issues introduced by open source components in their applications and container images. The OpenShift developer experience is intended to bridge the gap between the traditional OpenShift users, IT Operations, and developers by making their work visible across the OpenShift platform without requiring them to learn new tools.
We believe that security is best scaled when developers can take security into their own hands, empowered by tools that enable and encourage IT Operations and security teams to participate in, and gain visibility into, the vulnerability remediation process. Through our collaboration with Red Hat, Snyk is seamlessly integrated throughout the CodeReady Toolchain, part of the OpenShift developer experience, to help users of the OpenShift platform realize these benefits, regardless of the team they belong to.
In this webinar, we’ll show you how to fully leverage Snyk’s capabilities within your OpenShift environment. We’ll cover topics such as:
Analyzing dependency security and compliance in the IDE
Building security into CI/CD pipelines with OpenShift Pipelines
Scan containers for vulnerabilities directly from the OpenShift container registry
Continuously monitor your OpenShift environment for newly disclosed vulnerabilities
We’ve all heard about the need to ‘shift left’ when it comes to security in the DevSecOps pipeline. But with developers pushing further right in the pipeline, how do we go about introducing security practices in a way that the whole team will adopt?
Organizations need to modernize their application security, moving away from security gates and instead making security part of the phases in the delivery pipeline. This requires a developer-first approach that empowers developers to deliver secure code without impacting their workflows, and enables security teams to maintain visibility into the organization’s software security posture.
In this session, you’ll learn more about:
- Building a culture of shared responsibility for secure software delivery
- Enabling developers to write secure software with tooling that meets them “where they live”
- Eliminating gates and making security practices part of the delivery pipeline beginning with the user story
- Best practices for managing 3rd party/open source code and libraries.
The benefits of cloud native development are undeniable – from rapid deployments to scaling operations. However, modern cloud native applications both solve and introduce new security risks at each layer of the application.
Join Chaim Mazal, ActiveCampaign CISO, as he shares his experience in the cloud native space and offers tips for others. Mazal will discuss how he transformed ActiveCampaign’s security approach at each layer of stack – including 3rd dependencies, containerization, and infrastructure as code. Join us to learn the key strategies and unique insight for securing cloud native applications.
DevSecOps practices help build security and quality into the software delivery process by making everyone responsible for security at every stage. But, how do you make sure your process is doing the right things?
Modern cloud native technologies enable you to build, deploy, and scale rapidly. But this increased complexity exposes your application to new risks and vulnerabilities. Each layer of your cloud native application – spanning your code, third party dependencies, containers, and clusters – exposes you to new security concerns. And we’ll show you just how easy they are to exploit!
During this live hacking session, led by Simon Maple, Snyk’s VP of Developer Relations & Community, we’ll exploit an application as an attacker would to show threats, vulnerabilities, and misconfigurations that are most common in cloud native apps. Then, we’ll show you how you can protect your application through clear remediation actions and best practices for each attack scenario.
Best Practices for Securing Modern Cloud Native Application with ActiveCampaignChaim Mazal & Simon Maple[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]58 mins