IoT Security: Building Security in from the Start
Hear from IoT security experts to get your team on the right track. We’ll discuss:
- Why is it important to start with a secure hardware foundation for IoT products?
- What hardware and software security features should you look for in a secure platform?
- How is penetration testing an IoT product different from traditional IT systems?
- What lessons can be learned from IoT product penetration testing?
- What role can automated security analysis play in the product security lifecycle?
- What can a product team do today to get them on the road to security-by-design?
TOPICS:
|
|
|
Security Fundamentals: Application Security 101
When it comes to application security, it’s about enabling builders and defenders to jointly balance speed to production with acceptable risk. By prioritizing security earlier in the development cycle, potential downstream consequences of exposing application vulnerabilities to the wild can be avoided.
Our panel will discuss the effective methods of integrating security into the life of an application including:
1. Bridging the gap between security and development
2. Security tools within the SDLC and why and when to use them
3. Embedding security with existing tools and workflows
4. Why DAST
5. Ongoing monitoring and protection
TOPICS:
|
|
|
Shifting Left in Cloud Security: Can It Make You More Secure?
Cloud security is both a challenge and an opportunity for security teams. On one hand, microservices based multi cloud strategies require security teams to work much faster than before to support the business. On the other hand, there is a tremendous opportunity to make the security program more efficient by shifting security controls ‘left’ to earlier parts of the CI/CD pipeline than before.
In this session, Sid Deshpande - Field CTO, will be joined by a Bridgecrew executive, to discuss how Shift Left as a concept is transforming the security landscape.
Presenter: Siddharth Deshpande, Field CTO, Palo Alto Networks
Moderator: Garion Kong, CISSP, CCSP, Vice President, (ISC)2 Singapore Chapter
TOPICS:
|
|
|
Breaking Down Cloud Security: Securing Your Infrastructure
A Guide to Operational Security in 2021: Episode 8
Organizations are relying more and more on the flexibility and efficiency provided by cloud services. But it’s important to remember that cloud service providers only take responsibility for some security tasks. The customer is responsible for securing end user data, network traffic, and operating systems, as well as ensuring compliance with industry standards and regulations.
Cloud platforms also introduce some extra complications for security, such as complex cloud-based security tools, security information silos that make identifying attacks difficult, and attacks that focus on cloud platforms. To address risks and navigate cloud security challenges, you need to find a vulnerability management solution that continuously monitors misconfigurations in cloud networks. But what solution is best for your organization, and what does cloud security look like on a day-to-day basis?
In this session, we will discuss:
- How to find vulnerabilities in the cloud
- Cloud security complications and how to address them
- How to detect threats and ensure compliance across hybrid and multi-cloud environments
Speakers:
- Tod Beardsley, Director of Research at Rapid7
- Soo Youn Yi, Director, Cybersecurity Operations at Highmark Health
- Sumit Sengupta, Cloud Solution Architect at Microsoft
TOPICS:
|
|
|
How to Secure Your Enterprise Application Security & Visibility
Security threats have become more sophisticated and new application and cloud deployment models add to existing complexity. As a result, more than 3/4 of organizations are victims of successful cyber attacks - don't become the next victim! Join this session to learn common use cases and best practices for implementing VM microsegmentation to secure applications. Join us to cover product features, design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
Join this webcast to learn:
•Where and how Flow provides needed application security
•How to enable Flow and start adding security in minutes
•How policy creation and management is made easier through visualization
•How to quickly create virtual segmented networks (e.g. DMZ or Development and Production)
•Methods to segment applications to help prevent malware spread or data breaches
TOPICS:
|
|
|
How to Secure Your Enterprise Application Security & Visibility
Security threats have become more sophisticated and new application and cloud deployment models add to existing complexity. As a result, more than 3/4 of organizations are victims of successful cyber attacks - don't become the next victim! Join this session to learn common use cases and best practices for implementing VM microsegmentation to secure applications. Join us to cover product features, design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
Join this webcast to learn:
•Where and how Flow provides needed application security
•How to enable Flow and start adding security in minutes
•How policy creation and management is made easier through visualization
•How to quickly create virtual segmented networks (e.g. DMZ or Development and Production)
•Methods to segment applications to help prevent malware spread or data breaches
TOPICS:
|
|
|
Why Data Security is the Foundation for Your Security Posture
According to research from Rubrik Zero Labs, 93% of external organizations reported malicious actors attempting to impact data backups, and 73% saw attackers be at least partially successful.
Despite multi-layered security investments, threat actors are successfully breaching defenses and going after organizations’ data. That’s why data security is your last – and most important – line of defense.
Join this webinar and learn:
-> Why air-gapped, immutable, access-controlled backups are the best way to secure your data
-> How to continuously monitor your data for ransomware, manage sensitive data exposure, and hunt for indicators of compromise
-> What actions are needed to surgically and rapidly recover your apps, files, or objects while avoiding malware reinfection
Make sure to check out attachments, where we have made our latest insights on data security strategies available to you for free!
TOPICS:
|
|
|
Network Security - Is VoIP A Security Risk?
Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.
TOPICS:
|
|
|
Kubernetes Security: Securing Clusters with Microsegmentation
Kubernetes (K8s) remains one of the most widely adopted technologies for deploying and managing applications in cloud-native data centers, offering a kind of speed and flexibility that was never before possible.
However, K8s has one major drawback – security. As the K8s cluster network is inherently flat, it allows communication between clusters and pods by default. Just like in traditional networks, upon initial breach, an attacker can move laterally and gain access to all connected data centers and execute the attack.
Microsegmentation is foundational when it comes to best practices to secure K8s clusters, including Microsoft AKS and Openshift. The solution seamlessly protects other workloads in your environment, from legacy systems, to virtualized and cloud instances.
In this webinar, learn how you can visualize and secure your containerized applications with Akamai Guardicore Segmentation.
TOPICS:
|
|
|
Secure By Design: Ensuring That Security Is Built In
As software becomes a bigger component of the value delivered by companies in every industry, it is no exaggeration to say that every company is becoming a software company that is competing with software.
Companies are pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, developers more often assemble software than create it from scratch, as they are more frequently incorporating open source libraries to speed up time-to-market. However, as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.
In this session, Chris Wysopal, Chief Technology Officer and Co-Founder at CA Veracode discusses what it means to build software secure by design. He will describe how to build a software development process that has continuous security, is measurable, and is transparent.
TOPICS:
|
|
|