Tenable
How does your experience compare with the findings from this Ponemon survey of 2410 infosec professionals? All information security professionals responsible for improving overall cybersecurity effectiveness are encouraged to attend this session.
Watch Now
Do you need to stay up to date regarding ever-evolving IT compliance mandates? Would you like to learn best practices for approaching IT security compliance? This virtual fireside chat will help you get on the right path.
Watch Now
Trend Micro
Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now
CI/CD pipeline security has become a pressing issue for DevOps and DevSecOps teams. With today's frameworks and best practices, various security gates can be applied through the CICD process from writing the very first line of YAML in the CI, and later to the CD process.
Watch Now