Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps

Trend Micro

Join Trend Micro’s Sr. Product Manager for Hybrid Cloud Security, Kyle Klassen, and Sr. Software Developer, Geoff Baskwill for our webinar: Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps. They will outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.
Watch Now

Spotlight

The spreadsheet conundrum... Joe Smith, sales director for Great Start-Up Number 5 Billion and Thirty-One, puts on a blindfold and reaches out blindly for something, ANYTHING, to help him organize his team’s deals and commissions. He’s hopeful. He’s waiting. He knows he’ll come back with something. We’re talking metaphorically, of course. He’s not actually HOLDING a spreadsheet, he’s using Excel—because it’s the lowest hanging fruit. It’s free and easy to learn. And for a while, you know what? It works great. He can use VLOOKUPS and shortcuts to navigate. He can import booking results and activity metrics from Salesforce or his CRM. He can get so good at it that packaging complex algorithms becomes second nature.

OTHER ON-DEMAND WEBINARS

How Zero Trust can help protect financial services networks

Forescout

Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistication of cyberattack. Gain unparalleled situational awareness of malicious activity. Prevent the transfer of sensitive data and money. Simplify adherence to compliance regulations.
Watch Now

Improve Security, Privacy and Compliance with Continuous Oversight

Isaca

The concept of monitoring information system security has long been recognized as sound and valuable management practice. For additional consideration, a large portion of compliance requirements for information security and privacy are supported by such monitoring. Security programs must be aligned with privacy and compliance programs to ensure those areas of data protection compliance are appropriately met and monitored, and then actions based on maturity levels must be aligned with information assurance programs.
Watch Now

The New Intelligent Edge

AI. 5G. CLOUD. THE WORLD IS DIGITALLY TRANSFORMING. ARE YOU READY FOR THE NEW INTELLIGENT EDGE? Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success. By 2025, an estimated 41 billion connected devices will be generating some 80 zettabytes of da
Watch Now

Operationalizing Threat Intelligence to Battle Persistent Actors

ThreatConnect

Join Andy Pendergast, co-author of the Diamond Model and co-founder of ThreatConnect and Monzy Merza, Director of Cyber Research at Splunk to see how you can apply Threat Intelligence to protect your organization and prevent future breaches. During the talk, Andy will share threat intel on a nation state threat and Monzy will do a live demonstration of operationalizing the new Threat Intelligence.
Watch Now

Spotlight

The spreadsheet conundrum... Joe Smith, sales director for Great Start-Up Number 5 Billion and Thirty-One, puts on a blindfold and reaches out blindly for something, ANYTHING, to help him organize his team’s deals and commissions. He’s hopeful. He’s waiting. He knows he’ll come back with something. We’re talking metaphorically, of course. He’s not actually HOLDING a spreadsheet, he’s using Excel—because it’s the lowest hanging fruit. It’s free and easy to learn. And for a while, you know what? It works great. He can use VLOOKUPS and shortcuts to navigate. He can import booking results and activity metrics from Salesforce or his CRM. He can get so good at it that packaging complex algorithms becomes second nature.

resources