Webinars

Webinars

  • Deploying a Microservice Data Layer on Kubernetes

    Microservice architectures can be a game-changer for business agility and incremental application modernization. The pandemic and the current business climate have accelerated the motivation to re-platform legacy apps as cloud-native however, so have the challenges as modern applications need to respond in real time. According to IDC’s InfoBrief “The Impact of Application Modernization on the Data Layer”, 89% of the 300 North American enterprises surveyed already use microservices, and 66% leveraged Kubernetes. That might all sound great for microservices. However, the same enterprises also said microservices only accounted for 17% of their application portfolio due to a litany of data management issues when deploying at scale. We explore how Redis Enterprise, the real-time data platform, helps navigate the trade-offs and complexities of deploying at scale including a demonstration of a retail-banking microservice deployment using the Redis Enterprise Operator for Kubernetes on Red Hat OpenShift. Key Takeaways: ·         Learn best practices for building microservices leveraging a real-time data layer ·         How DevOps teams can easily manage, administer and deploy Redis clusters on Kubernetes ·         The critical capabilities of cloud-native Redis Enterprise make it the ideal data platform for real-time microservice-based applications Read More

  • How big data and AI are shaping the future of finance

    As big data and artificial intelligence (AI) continue to transform the finance industry, CIOs and tech leaders must stay on the cutting edge of these advancements to stay ahead of the competition and provide better experiences for customers. Embracing AI technology and leveraging big data can help financial institutions streamline processes, improve efficiency, and deliver more personalized services. To fully realize the potential of AI, CIOs and tech leaders must have a deep understanding of the latest AI trends and how they could shape the future of the finance sector. This includes exploring the implications of generative AI, such as ChatGPT, and identifying good and bad use cases for AI to ensure optimal outcomes. Join Starling Bank's Chief Technology Advocate, Jason Maude, for an insightful discussion on how big data and AI are revolutionizing the finance industry. Key topics to be explored include: - Today's top AI trends and future directions for the industry. - The potential impact of generative AI tools, including ChatGPT, on the finance industry. - Best practices for identifying good and bad use cases for AI in finance. - And much more. Read More

  • Drive compliance and regulatory requirements with service level objectives

    In the digital business world, reliability of service and customer satisfaction are fundamental benchmarks for application success. Google’s Service Level Objectives (SLOs) are a way of setting measurable goals around customer satisfaction and reliability to determine the level of service quality an application provides. Within the financial services sector, while reliability and customer experience are important, in the face of continued regulatory reform, application teams are also responsible for ensuring that all regulatory requirements and processes are being followed. SLOs can be used to directly implement these requirements, e.g., Payment Service Directive 2 (PSD2), with the necessary KPIs and automated alerts. In this session, Xue Liu (Reliability Lead in Deutsche Bank’s Private Bank Center of Expertise,) shares tips and best practices for embedding regulatory requirements into your SLOs. Join the session to discover: - Why incorporating compliance within SLOs matters and how it contributes to overall application success. - Best practices for integrating regulatory requirements within your SLO frameworks to ensure customer satisfaction, site reliability and adherence to industry regulations. - Collaboration strategies and processes to bridge the gap between compliance and application teams. - And more... Read More

  • Optimizing cloud application security through relevant ISO standards

    The concept of cloud applications have gone a long way from the days of peer to peer file sharing to modern enterprise solutions hosted in massive data centers. Nevertheless, there are areas in cloud applications, especially security, that can benefit from internationally recognized standards such as the ISO set of IT security standards. In this presentation, industry thought leader Ralph Villanueva will leverage his knowledge and experience in working with ISO standards to share some insights which can strengthen the audience’s cloud application security posture. Key takeaway: - Learn about ISO standards relevant to cloud application security. - Discuss pointers for implementing the relevant aspects of these standards. - Highlight ways to secure buy in from key stakeholders for implementation of these standards. Read More

  • The Human and Machine Identity Problem in SaaS Environments

    Software as a Service (SaaS) applications bring the promise of business agility and enablement. But like any technology that provides significant benefit, there are often security implementations that become overlooked. As your business grows and scales, so does the risk imposed at the identity layer across the SaaS estate. In this session, we will highlight the identity problem in SaaS; from human identities (internal employees, external vendors, third party contractors, partners, etc.) to machine identities (application-to-application connectivity, 3rd party OAuth applications, etc.). Attend this session to better understand the risks imposed on every identity within the SaaS estate, and pragmatic approaches to improve your posture. Read More

  • How to Prioritize Critical Vulnerabilities to Protect Your Cloud Applications

    As more organizations adopt microservices, containers, Kubernetes, and serverless architectures, the complexity of their IT environments continues to grow, creating an expanded attack surface. Given the dynamic and complex nature of cloud-native environments, how confident are you in your development and security teams' ability to identify and prioritize the most significant security risks and remediate vulnerabilities in a timely manner to reduce the risk of a security breach? To secure cloud-native applications, organizations use multiple tools from different vendors. However, these tools are often not developer-friendly, creating a fragmented view of risk. This results in an excessive number of alerts that can waste developers' time and delay remediation efforts. Join this fireside chat to learn why you need an end-to-end cloud application security solution in today’s dynamic and complex multi-cloud environment. And why it’s essential to address the most significant risks first, reducing the risk of a breach and saving valuable time and resources when time is of the essence. Key takeaways: • Improve Visibility: Gain real-time insights into security issues across cloud assets to reduce compliance violations and expedite deployment of cloud-native apps. • Contextualize Risks: Prioritize vulnerabilities that can have the most significant impact on cloud apps. • Enable Security through Collaboration: Prioritize vulnerabilities through collaboration among teams to develop effective remediation plans. Read More

  • Enhancing Mobile App Security: Strategies for Conquering Business Obstacles

    Security imposes a huge workload on app development teams. Regardless of how many mobile developers or security professionals your organization has, there’s a good chance it’s not quite enough in today’s evolving mobile threat landscape. There is just no single fix for the mobile app security problem that developers are facing. Criminals are continuously developing new mobile-specific attacks, 3rd party audits take time and effort, and regulatory changes have an impact on mobile security. So, what’s the solution? In this webinar, an impressive team of mobile app experts will share strategies to help organizations follow a mobile first mindset, which includes app shielding that keeps apps protected from unknown attacks, thus making efficient use of developers’ time. Key topics will include: - How to speed up app releases without compromising security - Preparing for a future when users will download apps from any app store - Introducing user-friendly zero-code technology that requires no development skills Dan McLoughlin, Field CTO OneSpan Lucas Gibbons, Senior Product Manager Alexander Kuznetsov, Solutions Sales Manager Zlatan Cekro, Senior Experience Engineer Read More

  • Top 10 Azure security tips from 10 years of securing Azure applications

    In the last 10 years, Azure has become one of the most popular cloud platforms for businesses and organizations of all sizes. As the platform has evolved, so has the threat landscape. To understand the present cloud security landscape and predict the future, let's take a trip down the memory lane! In this session, cloud security expert Karl Ots will discuss how Azure's security controls have evolved over time. Throughout the session, he will share best practices for securing your Azure infrastructure, applications, and data, so that you can build an architecture that stands the test of time. Read More

  • The Future of Attacker Automation and AI

    Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and which are bots. Taking advantage of this blind spot, hackers can easily automate or scale attacks, imitate human mouse usage, or leverage AI tools like ChatGPT to assist in malicious coding and phishing campaigns. And, because moderate and advanced bots can easily evade your defences by posing as human users, MFA, WAFs, and CAPTCHAs are no longer enough to mitigate this threat. Watch this Fireside Chat featuring David Warburton, Director at F5 Labs, the threat research division of F5, and Editor in Chief at ComputerWeekly Bryan Glick to access an in-depth discussion on the state of attacker automation and learn how to shore up your app vulnerabilities against emerging threats. Additional agenda items include: • The type of attacks bots and automation are capable of • Future trend predictions for AI-based attacks • Why cloud migration complicates the bot defence process Read More

  • Protect Your Apps and APIs to Thrive in a Multi-Cloud World

    With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. However, as applications are deployed across multiple cloud environments, they often fail to deliver the desired app-to-app connectivity and security. To simplify and secure your applications in an increasingly complex infrastructure, you need to deploy a Web Application and API Protection (WAAP) solution that enables consistent security across multi-cloud environments. In this session, you will learn how you can: • Deploy WAF, DDoS, bot defence, and API security functions across multiple clouds • Combine WAAP with cloud workload protection to secure the cloud-native infrastructure • Gain valuable insights into application threats by leveraging AI and ML capabilities By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time. Read More