Hi [[ session.user.profile.firstName ]]

Fitting Security Into Your Software Lifecycle: Automation and Integration

One of the biggest challenges in Application Security programs is the friction it causes between other teams due to the idea that security slows down speed and innovation. Business goals are to generate revenue with product and feature releases. In order for businesses to stay competitive, they can’t slow down innovation. Because of this, a fundamental principle of application security is to build security into your way of thinking and operating. In this webinar, we are joined by Sonatype and Saltworks to discuss how to accomplish this fundamental principle by leveraging key integrations and automation.
Recorded Apr 17 2019 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Duffy, Sonatype; Dennis Hurst, Saltworks; Jimmy Rabon and Brent Jenkins, Micro Focus
Presentation preview: Fitting Security Into Your Software Lifecycle: Automation and Integration

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Being Cyber Resilient During, After and Beyond Covid-19 Jan 14 2021 4:00 pm UTC 60 mins
    Christina Richmond, Program Vice President, Security Services, IDC, Mark Fernandes, CTO, Micro Focus, Bobby Singh, CISO, TMX
    Covid-19 has been challenging for us all. Organizations have struggled to deal with unprecedented strategic, financial, operational, and cyber challenges during this period. What is top of mind for the CISO is what do they need to consider securing and enable their business during, after (return to normal operations) and to prepare for the next crisis.

    During this session, Christina Richmond (Program VP, Security Services, IDC), Bobby Singh (CISO for TMX) and Mark Fernandes (CTO of Micro Focus Cyber Resilient) will participate in a fire-side discussion on the business benefit of enterprises pivoting to be resilient, how they can embark on the journey, and lessons organizations need to consider to be more resilient and become an enabler for accelerated growth as we come out of this crisis.
  • Do you know how to prioritize your open source findings? Dec 15 2020 4:00 pm UTC 60 mins
    Brent Jenkins, Director of Product Marketing and James Rabon, Director of Product Management, Micro Focus
    Come learn how Fortify and Sonatype have co-developed “susceptibility analysis” to allow developers and application security engineers to understand whether a publicly disclosed vulnerability has been actually invoked in your custom code, and more importantly, whether attacker controlled input reaches that function. No magic, no empty promises, just good research from Sonatype to the patching function and deep dive static analysis from Fortify.
  • Wrapping up ArcSight 2020 Dec 1 2020 4:00 pm UTC 60 mins
    Michael Mychalczuk, Dir Product Management, Security Operations, Micro Focus
    As we all know, 2020 was anything but a normal year. With changes across the globe affecting the cybersecurity industry, we have all had to intelligently adapt our limited resources to ensure resilience. Within the same year, ArcSight has made incredible strides to help security teams like yours defend what matters most to create a more resilient SOC. The newest release, ArcSight 2020.3, continues to deliver on this goal by simplifying your security operations through the Cloud, SOAR, and SIEM. This release aligns with ArcSight 2020.1 and 2020.2 to improve ArcSight’s next-gen capabilities and enable your team with intelligent tools.

    Join Michael Mychalczuk as he presents the key takeaways of ArcSight 2020.3, including the importance of SaaS and SOAR in your security toolkit. He will also reflect on the evolution of ArcSight during 2020, including the progress made to deliver a truly end-to-end SecOps solution. We’ll then touch on the future of ArcSight and how it will help you achieve true cyber resilience.
  • How to Build a Strong IAM Foundation with Identity Governance and Administration Recorded: Nov 17 2020 58 mins
    Rick Wagner, Director, Product Management, Patrick Gookin, Sr. Product Manager; Lara Bender, Product Marketing Manager
    Identity Governance and Administration (IGA) provides the identity foundation that powers today’s most important security initiatives, including Zero Trust, Digital Transformation, and Cyber Resilience. With a comprehensive IGA program, you'll have the critical capabilities and identity services to bridge data and product silos and adapt at the speed of change.

    Join us for this webinar on Tuesday, November 17th to learn how IGA:
    • Delivers the key capabilities that underlie all successful digital transformation initiatives
    • Dramatically reduces the complexity, cost, and risk of integrating standalone identity and access management (IAM) capabilities
    • Enables cyber resilience by providing a continuous approach to compliance and security
  • Analytics Accelerate (Securely) into the Cloud Recorded: Nov 3 2020 61 mins
    Sid Dutta and Rich Gaston, Micro Focus Voltage
    Today, every enterprise is a data company, collecting, storing, and processing high-value data for insights and innovation. But traditional IT is not flexible or scalable enough to manage the explosion of data at rest, in transit, and in use in analytics platforms and data lakes. Forward-looking enterprises are using data-centric security to protect privacy and unleash the power of secure analytics.

    With the expansion and overhead of IT infrastructure, the cloud becomes an easy choice for its virtually infinite scale, on-demand provisioning, high availability, and many other advantages. But frequent data breaches in the cloud mean security and privacy concerns are also increasing – and presenting barriers to rapid cloud adoption.

    Learn how businesses are removing the obstacles to data protection and privacy in the cloud. Join us for this webcast to understand how to:
    • Simplify the acceleration of analytics into cloud environments through cloud-agnostic, data-centric protection
    • Provide faster decision support and add business value while dramatically reducing the risk of data breach and privacy non-compliance in multi-cloud deployments
    • Take advantage of native cloud services for ETL, object storage, streaming, data lakes, visualization, data discovery, catalog, and other services – all seamlessly integrated with data-centric security
  • SecOps in 2020: Insights from the SOC Recorded: Oct 20 2020 60 mins
    Steve Piper, CEO, CyberEdge Group and Mark Fernandes, Chief SecOps Strategist, Micro Focus
    The upcoming 2020 State of Security Operations Report, with insights collected from over 400 IT security professionals across the globe, will offer a unique perspective into how security operations has changed during this unusual year.

    Join us for this webinar with CyberEdge Group CEO Steve Piper and Micro Focus Chief SecOps Strategist Mark Fernandes as they discuss the results of the report, with a particular focus on people, processes, business perspective, and technology. We’ll also cover MITRE ATT&CK usage, cloud security migration, and the unique SecOps challenges brought on by COVID-19.

    We look forward to having you join us.
  • Behind the Privacy Shield:The Art of Data Protection Recorded: Oct 8 2020 56 mins
    Paolo Balboni - EU ICT, Privacy & Data protection lawyer at ICT Legal Consulting/Tobias Fuertjes –Presales Cons. Data Privacy
    In a globalized digital world, purely national thinking is no longer enough. The flow of data across national borders has become a matter of course and happens in seconds. When the EU-US Privacy Shield was put into effect in 2016, data exchange with the US was placed in a stable state. Now, however, the European Court of Justice (ECJ) has overturned the agreement, with immediate effect.

    This means that data exchange with the US is not permitted in many cases, so the time has come for international companies to act. After all, businesses worldwide depend on a functioning international data exchange and, thus, corresponding data protection. How can you:
    •Continue to share data with business partners in the US while reducing regulatory risks?
    •Protect your sensitive data and at the same time not restrict your business partners in their work?
    •Use cloud platforms and CRM systems from US companies more securely?

    The answer? Encryption!

    Join this exciting webinar with data privacy experts to learn how your organization can safely navigate international data exchange. We’ll walk you through practical, relevant use cases to discover answers and the actions you can take:
    •What are the immediate and long-term consequences of the ECJ ruling
    •What the data protection authorities require, which data you should protect, and how
    •How encryption can help you meet legal requirements
    •How encryption must look to meet your business needs

    We look forward to having you join us.
  • Adding Intelligence to Adaptive Access Recorded: Oct 7 2020 62 mins
    Andras Cser, VP, Principal Analyst, Forrester and Gireesh Kumar, Sr Product Manager, NetIQ Access Management, Micro Focus
    With so much sensitive information being consumed by remote users, most organizations have some level of an access control strategy in place. Setting access control right is very hard and often results in poor user experience. While the array of potential device and network options used for access creates various blind spots, the one constant metric is the user's behavior. But effective access control is more than having the raw user metrics, but rather leveraging a solution that is simple to set up, use and maintain.

    Join us to learn about intelligent access control:

    • Andras Cser of Forrester will kick off the discussion with real-world examples and observations illustrating why user context needs to play a central role in managing access, and then how User and Entity Behavioral Analytics (UEBA) helps achieve it.
    • Gireesh Kumar will explain how Micro Focus can automate the assessment of behavioral analytics that finds high-risk access, invokes a higher level of identity verification and/or adjusts the user’s current authorization based on the risk at hand, all in a model that is easy for IT and security teams to apply to their environments.
  • Voltage SmartCipher & SecureMail: Integrated to expand data privacy & protection Recorded: Sep 15 2020 55 mins
    Anthony Knight, Voltage Product Manager and Chip Charitat, Voltage Specialist, Micro Focus
    With the mounting weight of legal and regulatory mandates, the need to ensure data security and governance amidst rising volumes of data has become a top priority for IT leaders and the C-suite. Organizations are struggling to gain control of their data, ensure that it’s secure, obtain greater insight into customer needs, address compliance and enhance overall productivity.

    Micro Focus SmartCipher introduced simplified unstructured data security, delivering control over the use and proliferation of sensitive files for secure collaboration and improved privacy compliance. SmartCipher’s latest release enhances this art form by integrating with SecureMail to encrypt and inspect email content and attachments with SmartCipher policies.

    Join us on this webinar to find out more how Micro Focus can help you:
    • Encrypt and inspect email content and attachments with SmartCipher policies
    • Ensure security and governance over your identities, applications and data—from creation to disposition and throughout the information lifecycle
    • Encrypt data persistently wherever it is—in applications, databases, analytics, the cloud and files on the network and endpoint
  • The Synergies with SAST and DAST Recorded: Sep 1 2020 62 mins
    Andrew Garrett, Rick Smith and James Rabon, Micro Focus
    Did you know that the combination of static (SAST) and dynamic (DAST) application security testing methodologies provides a more comprehensive view of an application’s risk posture? Static analysis tools give security teams thorough feedback early in the SDLC, while dynamic analysis tools provide a quick win by immediately discovering exploitable vulnerabilities in either production or pre-production environments. Testing in both ways yields the most complete view of the risk posed by weaknesses and vulnerabilities within the application.

    Join members of the Micro Focus Fortify team to discover five reasons why SAST + DAST is vital to a successful, comprehensive Application Security program.
  • Explore the Path to Universal Policy Management Recorded: Aug 18 2020 63 mins
    Charles Davis, Full Armor Corp and Tim Sedlack, Micro Focus
    Organizations must enforce security policies, configuration, and access controls consistently across their entire infrastructure, but the complexity and hybrid nature of today’s IT environments introduces new challenges. Brand new policy management solutions from Micro Focus can help.

    AD Bridge extends AD controls to Linux, UNIX, and cloud resources; Policy Compliance Assessor checks cloud readiness and migrates GPOs to Azure Intune, while Universal Policy Manager helps consolidate and simplify enterprise and cloud policy management.

    Attend this session to learn about these innovative and transformative solutions.
  • Extend the power of Active Directory to better manage and secure Linux resources Recorded: Aug 4 2020 51 mins
    Charles Davis, Full Armor Corp and Tim Sedlack, Micro Focus
    Would you like to eliminate manual, fragmented management processes and scripts by unifying how you manage authorization and authentication across your entire environment?

    Securing and maintaining a Day 1 desired state configuration of your Linux, UNIX, Mac and Non-domain joined Windows servers that are on-premise and in the cloud can be extremely challenging. Micro Focus AD Bridge is ‘Next Generation’ bridging. It natively joins a variety of resources to Active Directory so that they are managed just like your Windows servers without replicating users or requiring VPN. AD Bridge extends Group Policy with extensive settings (firewall, SSH, HTTP, FTP, IPTables, sudoers, services, config files, and more) so that your IT Managed Resources are configured, persisted, monitored and audited for compliance regardless of their location.

    This webinar will provide key information on AD Bridge and real life customer examples.
  • ArcSight 2020: The Evolution of the SOC Recorded: Jul 21 2020 63 mins
    Michael Mychalczuk, Dir. Product Mgmt, Security Operations and Eugenio Marrero, Sales Engineering Mgr, Micro Focus
    ArcSight turns 20 this year! The cybersecurity industry has experienced non-stop growth and change over the last two decades, and security solutions like ArcSight have continually worked to evolve and adapt to these changes.

    Join ArcSight Specialist Gene Marrero and ArcSight Commander Mike Mychalczuk as they discuss the journey of SIEM and what lies ahead for SOC teams as they strive to advance their threat detection and response capabilities. It’s an hour you don’t want to miss as we look back on 20 years in security, and unveil the latest and greatest of our upcoming ArcSight 2020 release.
  • Information Protection While Working From Home with Connected Recorded: Jul 15 2020 60 mins
    Ed Gavin, Product Manager, Micro Focus
    Remote work is increasing worldwide as a result of Covid-19. According to a recent survey of CFO’s by Gartner, 74% of respondents plan to shift more employees to remote work permanently. The shift to less secure and controlled home work environments puts more business critical information at risk of loss to ransomware attacks, insider threats, device loss or theft.

    Join Micro Focus to discuss these challenges and to learn how a policy based enterprise endpoint backup and recovery strategy can ensure that your organization’s valued information is always protected from data loss enabling you to embrace remote work with confidence.
  • Micro Focus Supervisor: An In-Depth Look at Solving Compliance Challenges Recorded: Jul 14 2020 61 mins
    Dennis Wild, Senior Product Manager - Supervisor and Howard Konopka, Business Consulting, eDiscovery, Micro Focus
    Organizations across a variety of verticals face increasingly complex regulatory environments. Bodies such as SEC, FINRA, and IIROC in addition to privacy regulations like CCPA and GDPR require strict supervisory retention and review plus precise processes to meet requirements. Many organizations leverage supervision technology to ensure compliance with internal requirements. This is complicated by exponential data variety, growth, and velocity.

    Attend this webinar and learn how you can scale to facilitate a comprehensive solution to align with your compliance processes and procedures.
  • The Artistry of Deleting Data Recorded: Jul 9 2020 24 mins
    David Gould, Senior Director, Secure Content Management Solutions, Micro Focus
    True artists understand the skill of editing their work—leaving only what is essential to convey their message. Data security experts must also know how to edit the exponential amount of data they collect. They must understand complex data privacy laws, know what data has privacy implications, and delete the data that isn’t needed in order to comply. This challenging new paradigm means organizations must rethink how to effectively manage their data through a defined lifecycle. Join our webinar to learn how Micro Focus solutions help ensure compliance, support legal requirements, and manage the lifecycle of your data from creation to deletion
  • Artfully Transforming Your Business and Managing Your Data Lifecycle Recorded: Jul 8 2020 21 mins
    Greg Clark, Director, Product Management, Micro Focus
    Artists take their creations through lifecycles to present important messages—even the selection of the final frame can make a difference. So, too, must organizations understand effective data management to maximize its business value, preserve data integrity, meet regulatory requirements, and reduce risk. This includes finding and analyzing key business and customer data and increasing the visibility into structured and unstructured data. Careful data lifecycle management is key to protecting your reputation, improving security, becoming more efficient, and maintaining regulatory compliance. Micro Focus solutions help customers around the world address data governance to enable greater speed, agility, and insight. Join this webinar to discover how we can help you achieve these benefits, too.
  • Reaching Zero Trust Access Control while Maintaining Low Friction Recorded: Jul 7 2020 60 mins
    Gireesh Kumar, Sr Product Manager, NetIQ Access Management & Stephan Jou, Interset CTO, Micro Focus
    As organizations elevate their security to Zero Trust level, maintaining or even improving the user’s experience remains paramount. Learn how the NetIQ Risk Service brings user and entity behavior analytics (UEBA) with out-of-the-box machine learning models. Using Micro Focus Interset powered machine learning, IT security teams now have access to personalized security to build individualized context. Organizations can use this level of personalized security to keep friction low for users accessing sensitive information while protecting themselves from malicious outsiders attempting to exploit it.

    The NetIQ Risk Service is the new central point of risk evaluation and scoring for the NetIQ product line.
  • Data Privacy & Protection: The Art of Protecting Data Recorded: Jul 2 2020 49 mins
    Ramses Gallego – International Director, Security, Risk & Governance – Micro Focus
    Periods of great change can produce great art. When looking at business, an increasing pressure around data (the amount collected, its security, and governance) is contributing to great business transformation. Data privacy and protection means you need new ways to control and secure customer data. And at the same time, you want to gain greater insight into your customers, ensure compliance, and enhance your overall productivity. Join us to find out how Micro Focus offers simplified, automated solutions that can provide security and governance over your identities, applications, and data—from creation to disposition and throughout the information lifecycle.
  • Mixing and Mastering the Art of Data Security Recorded: Jul 1 2020 17 mins
    Reiner Kappenberger, Product Management Director, Data Security, Micro Focus
    As a professional “security artist,” you understand the need to master the necessary tools, technologies, and processes to enable protection and usability for your data. You also know the importance of delivering efficient, consistent, and secure access to your most valuable corporate assets. As with any art form, the critical first steps are to choose a subject and composition—that is, to establish the framework and find a leading thread that ties the disparate elements into a consistent whole. While many security professionals start at the network and take a layered defense approach, those who are cybersecurity focused work in the opposite direction and start at the data layer. Join us for this webinar to learn how to close the gaps and unify your data security. You’ll discover how to encrypt data persistently wherever it is—in applications, databases, analytics, the cloud, and files on the network and endpoint—from creation to disposition and throughout the information lifecycle.
Leading Security, Risk and Governance Platform
With the industry’s broadest set of integrated Security, Risk, and Governance solutions, combined with deep domain expertise and industry-leading analytics, Micro Focus is uniquely suited to help organizations take a holistic approach to protecting identities, apps, and data. Very few vendors can assure security and governance professionals that they are protecting against breaches, guarding the privacy of individuals and their data, and complying with regulatory and jurisdictional regulations – at scale, with ease, insight and confidence. Visit Micro Focus Security, Risk, & Governance at: https://www.microfocus.com/en-us/trend/security-risk-governance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Fitting Security Into Your Software Lifecycle: Automation and Integration
  • Live at: Apr 17 2019 3:00 pm
  • Presented by: Michelle Duffy, Sonatype; Dennis Hurst, Saltworks; Jimmy Rabon and Brent Jenkins, Micro Focus
  • From:
Your email has been sent.
or close