InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Accelerating and Securing Your Cloud Modernization Journey

Presented by

Stephen de Vries, Antti Ropponen & Kreshnik Rexha

About this talk

As many organizations accelerate their Cloud Modernization journey to ensure that they provide the best customer experience and compete with cloud-native market entrants, they’re adopting new tools and processes that allow them to scale rapidly and reduce duplication and resource requirements. In this fireside chat we discuss how modern, collaborative and scalable threat modeling helps to bring together teams to accelerate cloud service deployment. We will discuss how Cloud orchestration tools such as AWS CloudFormation and HashiCorp Terraform allow rapid design and deployment strategies through techniques such as Infrastructure as Code (IaC), when used with tools such as IriusRisk, bring together Product Owners, Developers, AppSec and DevOps functions to understand and incorporate security more effectively while accelerating service development, deployment and reducing costs and complexity.
IriusRisk

IriusRisk

803 subscribers13 talks
Educational Threat Modeling Videos for Security Professionals
IriusRisk is the industry's leading threat modeling and secure design solution in Application Security. With enterprise clients including Fortune 500 banks, payments, and technology providers, it empowers security and development teams to ensure applications have security built-in from the start - using its powerful threat modeling platform. Whether teams are implementing threat modeling from scratch, or scaling up their existing operations, the IriusRisk approach results in improved speed-to-market, collaboration across security and development teams, and the avoidance of costly security flaws.
Related topics