On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

The Secret Life of Secrets

The Secret Life of Secrets

Cloud services are on the rise with ever-growing workloads as more and more secrets are being created by the R&D teams. The number and variety of secrets per organization are exploding. Unfortunately, so are devastating secret-based attacks. In this expert virtual round table we will explore: The importance of integrating ... Read More
November 7, 2023
Entro
Protect Your APIs Today, for a Safer Tomorrow

Protect Your APIs Today, for a Safer Tomorrow

Protecting APIs from attack has emerged as a top-of-mind priority for security organizations heading into 2024. As security pros begin to build plans and strategies, it quickly becomes clear that the challenges are much more complex than they may appear on the surface. Why? APIs are everywhere! They connect web-facing ... Read More
November 6, 2023
ThreatX
AWS Immersion Day: Secure Container Workloads In Build-Time With Snyk

AWS Immersion Day: Secure Container Workloads In Build-Time With Snyk

With cloud deployments transforming what was traditionally ‘infrastructure’ to code, development and security teams face new, increased pressure in their attempt to build secure applications quickly. With developers in the driver’s seat, organizations are using modern DevOps processes with integration and deployments happening many times a day and at scale ... Read More
November 1, 2023
AWS | Snyk
AppSec 101: Complete Application Security Across the SDLC

AppSec 101: Complete Application Security Across the SDLC

Whether you create your applications in-house or through a third party, testing for vulnerabilities early before production is essential to save time and reduce cost. In this Techstrong Learning Experience, we’ll explore the fundamental components of building a scalable and secure SDLC, from code inception to deployment. Enhance your application ... Read More
October 31, 2023
Outpost24
How to Shift Left the Right Way

How to Shift Left the Right Way

Application Security isn’t just a security problem. It’s a business problem. While many organizations understand the benefits of shifting security left, they fail to consider the platforms and fuel needed to make it truly work. Shifting Left is just as much about coordination and collaboration as finding and fixing. Join ... Read More
October 26, 2023
StackHawk
Reporting From the Pipeline: The State of Software Security in DevOps

Reporting From the Pipeline: The State of Software Security in DevOps

Requisite for proper DevSecOps, integrated security controls across the development lifecycle and CI pipelines establish mechanisms for rapid risk detection, accelerated remediation, and automated security gates. But aligning software development, AppSec, and DevOps teams to realize a vision for secure DevOps requires a clear strategy. This year’s DevSecOps Report defines ... Read More
October 24, 2023
Synopsys
Managing Security Posture and Entitlements in the Cloud

Managing Security Posture and Entitlements in the Cloud

Federating access and ensuring compliance across multi-cloud and hybrid environments is a challenge. This is especially true without proper visibility and processes in place to understand what’s being deployed and how to maintain least-privilege access. Credentials are the number-one attack vector in the cloud, and threat actors are increasingly using ... Read More
October 19, 2023
Tenable
Live Workshop on 'SCA 2.0': Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

Picture this: Your application is composed of 12 Docker containers. Together, they have 400 packages. Your SCA scan detects 120 critical and high vulnerabilities. Your dev team doesn’t have the cycles to fix all of them in time. How do you identify which vulnerabilities truly represent higher risk? In this ... Read More
October 18, 2023
Deepfactor
Securing Cloud-Native Applications Across the Software Development Life Cycle

Securing Cloud-Native Applications Across the Software Development Life Cycle

Cloud-native applications open a new frontier for application risk from multiple sources. Risk reduction approaches for cloud-native applications need to take a holistic approach to the software development lifecycle to be effective. In this webinar you will learn: Why this involves finding and remediating risks as they are introduced, from ... Read More
October 17, 2023
Mend | AWS
Shadow Access: Where IAM Meets Cloud Security

Shadow Access: Where IAM Meets Cloud Security

Cloud, application data, AI, and third-party access are growing concerns that create identity and access management (IAM) blind spots. These cloud IAM blind spots represent an ever-expanding threat vector to cloud security, enabling unmonitored, unauthorized ‘shadow access’ and the potential for data exposure. Cloud security and cloud operations teams need ... Read More
October 16, 2023
Stack Identity