Attackers have many opportunities to strike on-site and cloud-based enterprise applications from early in the development process. But many solutions and tools — such as the emerging DevSecOps framework – are available to better secure applications and ensure security is prioritized within DevOps and application security testing tools. Tune into this summit to hear leading experts discuss how to secure applications in your enterprise infrastructure with strategies like DevSecOps along with the right combination of tools and testing.
View webinars, fireside chats and keynote presentations from leading security innovators, vendors and evangelists.
Tracks
Ensure security remains top priority in application development by implementing a DevSecOps strategy
Discover leading application security tools and testing solutions to accelerate and better organize the app development process
Learn how to best secure cloud and mobile-based applications with demonstrated strategies and helpful tools
Fireside Chats
How the New Web Application Architecture is Changing Web Application Security
Web applications are moving from traditional back-end and front-end architecture, deployed in an organization’s physical data center, to modern multi-cloud, microservices, and Kubernetes architectures, opening up new threat surfaces along the way. How are you to, for instance, secure application vulnerabilities from supply-chain attacks when your data is dispersed across multi-cloud applications?…
The Future of Attacker Automation and AI
Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and which are bots. Taking advantage of this blind spot, hackers can easily automate or scale attacks, imitate human mouse usage, or leverage AI tools like ChatGPT to assist…
How to Prioritize Critical Vulnerabilities to Protect Your Cloud Applications
As more organizations adopt microservices, containers, Kubernetes, and serverless architectures, the complexity of their IT environments continues to grow, creating an expanded attack surface. Given the dynamic and complex nature of cloud-native environments, how confident are you in your development and security teams’ ability to identify and prioritize the most significant security…
A Special thank you to our Sponsors!
Diamond Sponsors



Platinum Sponsors





Gold Sponsor

Featured Presenters

Gopinath Manimayan
Lead Architect – Digital Experience
Moonraft

Vincent Amanyi
Founder
Boleaum Inc.

Deveeshree Nayak
Assistant Teaching Professor
University of Washington School of Engineering and Technology

Karl Ots
Head of Cloud Security
EPAM

Eric Hanselman
Chief Analyst
451 Research

Justin Lam
Research Analyst TMT
S&P Global Market Intelligence

Keiron Shepherd
Senior Solutions Architect
F5 Networks

David Warburton
Director
F5 Labs

Bryan Glick
Editor-in-Chief
ComputerWeekly

Shweta Khare
Principal Technical Product Marketing Manager
Cisco ET&I

Matt Slotten
Director of Technical Marketing
Checkmarx

Bryant Schuck
Lead Product Manager
Checkmarx

Eyal Arazi
Senior Product Marketing Manager
Radware

Simon Ratcliffe
Principal Consultant
Ensono

Michelle Drolet
CEO & Founder
Towerwall

Arlen Baker
Principal Security Architect
Wind River

Dan McLoughlin
Field CTO
OneSpan

Lucas Gibbons
Senior Product Manager
OneSpan

Alexander Kuznetsov
Solutions Sales Manager
OneSpan

Zlatan Cekro
Senior Experience Engineer
OneSpan

John Grady
Principal Analyst
Enterprise Strategy Group

Doug Browne
Director for Cloud Security & SSE, APJC
Cisco Systems
Audience
CIOs, CTOs, MDs, Heads, EVPs, SVPs, VPs, Directors, Managers, Practitioners, and Consultants within:
IT / IT Architecture / IT Infrastructure
Systems Engineering
Software Engineering / Data Engineering
Solutions Architecture
Cloud Architecture / Cloud Security
Data Strategy & Architecture / Data Center Ops
Hybrid-Cloud / Multi-Cloud
AI Automation / Machine Learning
Cybersecurity / Cyber Intelligence
Network Development
Development Operations
Project & Product Management
In Partnership With
