Webinars

Webinars

  • Prioritizing SSE to Protect the Modern Digital Business

    Current IT environments and the reality of modern business practices have left organizations with no choice but to consider new security models. The need for security resilience and the ability for business leaders to protect the integrity of every aspect of their businesses so that they can withstand - not just survive - and emerge stronger from unpredictable threats or changes has never been greater. In this webinar, Enterprise Strategy Group’s Senior Analyst John Grady is in conversation with Doug Browne, Director for Cloud Security and SSE, APJC at Cisco Systems, to discuss why security service edge (SSE) is the best way that businesses can forge this security resilience. Join them to learn: - The security challenges that are forcing businesses to consider new security models - Drivers for SASE interest and the challenges and opportunities that SSE brings - Practical advice for planning and getting started with security service edge and SASE expansion - SSE use cases in Asia Pacific region. - Considerations for choosing vendor partners Read More

  • Considerations in application tooling

    Tune into this session from industry thought leader Vincent Amanyi for insight on how to simplify you application security tooling and enable agility in your ecosystem. Attendees will come away with the knowledge to: - Eliminate assumptions. - Identify how to perform a comprehensive assessment. - Strategy of implementing tools-based on complexities and evolution. Read More

  • Security and the DevSecOps Platform: Approaches, Methods, and Tools

    Only 8% of organizations have secured at least 75% of their cloud-native apps using DevSecOps (Enterprise Strategy Group). DevOps is enabling faster deployment of more secure software to devices by tightly coupling development and operations functions. However, to ensure security, the DevOps pipeline itself must be secure. At the intelligent edge, mission-critical systems require that security is built into the development process for a true DevSecOps environment. What you will learn: - New security approaches for the emerging intelligent edge - Methods for full lifecycle security for mission-critical systems - Must-have development tools for security validation - Lessons learned in the journey to build security into a DevSecOps environment Read More

  • Explore application security tools and testing to strengthen software defenses

    In today's digital landscape, ensuring the security of software applications has become paramount. With the rise in cyber threats and the potential for devastating breaches, organizations must adopt robust application security measures to protect their sensitive data and maintain user trust. This presentation from TD Bank's Pankul Chitrav aims to shed light on the critical role of application security tools and testing in fortifying software defenses. Read More

  • Web Application Security is Broken. What Comes Next?

    Whether it is a new web application architecture creating new threat surfaces, new zero-day attacks challenging traditional security mechanisms, or the just the shortage of cybersecurity staff to keep track of it, organizations today are straining to defend against web application attacks and vulnerabilities.  The traditional ways worked no longer applies, and a new web application security paradigm is required to protect organizations against an emerging wave of web attacks.   Join this presentation to learn:   * What are the key trends in web application security, and what are the key challenges facing organizations * How modern web application design architecture is creating new threat surfaces * What are the criteria that web application security tools should meet, in order to protect organizations * And how radware helps organizations defend themselves against emerging threats Read More

  • Understanding Growing AppSec Concerns Around API Security

    If shadow and zombie APIs are climbing your AppSec priority list, you’re not alone. Software development teams are increasingly using APIs for web applications and other needs, and that’s motivating attackers to find ways to exploit them. In fact, security experts are predicting that APIs will continue to experience a growing number attacks. It’s a gap in application security testing that has become a growing problem for many teams. This webinar will introduce our solution. Checkmarx has found a way to shift API security way left, giving AppSec teams complete API visibility and helping them fix problems earlier in the SDLC – faster and at a lower cost. Our experts will cover: - An explanation of shadow and zombie APIs - How Checkmarx identifies and fixes vulnerable APIs earlier in the SDLC - Remediation that prioritizes the vulnerabilities that represent real risks Read More

  • How the New Web Application Architecture is Changing Web Application Security

    Web applications are moving from traditional back-end and front-end architecture, deployed in an organization’s physical data center, to modern multi-cloud, microservices, and Kubernetes architectures, opening up new threat surfaces along the way. How are you to, for instance, secure application vulnerabilities from supply-chain attacks when your data is dispersed across multi-cloud applications? How do you protect from vulnerabilities in 3rd and 4th-party libraries? Join our experts deconstruct the most essential requirements for complete web application protection in the following Fireside Chat and explain: • New web application attack vectors, beyond the standard OWASP top 10 • How usage of 3rd and 4th-party libraries and APIs increases app vulnerabilities • The security and liability implications of using client-side logic and code • How Radware helps organizations protect their modern web applications. Tune into this session to discover how to protect your web apps from these, and other, vulnerabilities. Read More

  • Ensure security with DevSecOps

    In this in-depth talk, University of Washington's Deveeshree Nayak will discuss the benefits of implementing DevSecOps in businesses, emerging DevSecOps frameworks, and their use. Tune into this webinar to learn: - What is DevSecOps? - Why is this role important? - How to pursue career in DevSecOps? - Hiring and execution. Read More

  • Key Findings from the 2023 Thales Data Threat Report

    In this webinar you will get insights into the latest data security trends, threats and emerging topics in the 2023 Thales Data Threat Report. Based on a survey of more than 3,000 IT security professionals across 18 countries around the world, the 2023 Data Threat Report presents a number of findings on top data security topics, including leading sources of data threats, ransomware attack trends, digital sovereignty, the threats of quantum computing, and challenges of cloud security - just to name a few. Attendees will receive a free copy of the 2023 Thales Data Threat Report and will be able ask questions following the presentation by 451 Research, part of S&P Global Market Intelligence, who wrote the report. Read More

  • A CXO’s guide to application security in the age of digital transformation

    Enterprises are increasingly relying on applications to drive business growth and success in the age of digital transformation. However, the rise of cyber threats has made ensuring the security of these applications more critical than ever before. Security concerns can often slow down digital transformation initiatives, but application security controls can help enterprises reduce costs and improve speed of delivery. In this webinar, we'll provide a CXO's guide to application security in the age of digital transformation. We'll explore - Latest threats to enterprise applications and how to mitigate them. - Risks associated with cloud-based applications and how to secure them. - How application security controls can reduce costs and improve speed of delivery. - Strategies and technologies to improve the security posture of enterprise applications. - Role of DevSecOps in application security and how it can accelerate digital transformation efforts - Best practices for integrating security into the development process - How to balance security concerns with the need for innovation and agility in digital transformation initiatives. Read More