On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

The Radical Future of Application and API Security Testing

The Radical Future of Application and API Security Testing

In the future, application and API security testing will be done in production as opposed to in pre-prod. We are on the cusp of a revolution in app and API security testing like the one that occured for performance testing, where it shifts to production. The way we do AppSec ... Read More
August 14, 2024
Contrast Security
DevSecOps

DevSecOps

As the importance of securing software supply chains continues to grow, DevSecOps practices are being increasingly adopted to meet this demand. The challenge lies in optimizing these processes to ensure developers embrace them without compromising the speed of application development and deployment. Join us for an insightful webinar where we ... Read More
August 12, 2024
Devops.Com
Addressing the Security Challenges of Operational Technology

Addressing the Security Challenges of Operational Technology

In today’s digital landscape, the convergence of IT and operational technology (OT) brings forth new challenges for CISOs in critical infrastructure sectors. Many are facing the harsh reality that traditional IT risk methods fall short when securing cyber-physical systems (CPS). CPS environments differ greatly from their IT counterparts due to ... Read More
July 18, 2024
Claroty
Strategies for Success: Developing a Comprehensive Cloud Vulnerability Management Program

Strategies for Success: Developing a Comprehensive Cloud Vulnerability Management Program

Are you looking to develop a comprehensive cloud vulnerability management program? Register today for an insightful webinar where industry leaders will share actionable strategies, proven methodologies and practical tips for success. You’ll also gain valuable insights into identifying, prioritizing and remedying vulnerabilities in your cloud infrastructure to strengthen your overall ... Read More
July 16, 2024
Palo Alto Networks
On the Brink: Why AppSec Leaders are Burning Out (and How to Stop It)

On the Brink: Why AppSec Leaders are Burning Out (and How to Stop It)

Application Security (AppSec) leaders are facing increasing levels of burnout due to the demanding nature of their roles. This webinar addresses the critical issue of AppSec leader exhaustion, exploring the unique challenges that contribute to this trend and offering practical solutions to alleviate the pressure. AppSec is a niche yet ... Read More
June 27, 2024
Mend.io
How Many Types of SBOM Are There?

How Many Types of SBOM Are There?

As far as the Cybersecurity and Infrastructure Security Agency (CISA) is concerned, there are six types of SBOMs that can be created for a single application or piece of software; none of which will be identical. While CISA doesn’t have a favorite type of SBOM, you may find that your ... Read More
June 25, 2024
Synopsys
A Realist Approach to Least Privilege in Cloud

A Realist Approach to Least Privilege in Cloud

Implementing the principle of least privilege across all 42k+ permissions and 600+ services presents an overwhelming challenge. Achieving it is impossible and unsustainable with the rate at which dev teams would request new access. We have to redefine least privilege and what it means to be secure in the cloud ... Read More
June 20, 2024
Sonrai Security
Mastering AI Security Posture Management for Cloud Security Professionals

Mastering AI Security Posture Management for Cloud Security Professionals

The adoption of AI-powered applications is accelerating rapidly, challenging cloud security professionals to keep pace with robust protections. This webinar will offer you effective strategies to manage AI sprawl and shadow AI models, ensuring your governance structures can meet stringent AI security and privacy regulations. Join us for a dynamic ... Read More
May 21, 2024
Palo Alto Networks
How to Define a Zero-Trust Strategy Across Multiple IT Silos

How to Define a Zero-Trust Strategy Across Multiple IT Silos

Zero trust approaches to cybersecurity are all the age these days as cyberattacks continue to increase in volume and sophistication. The challenge is zero-trust isn’t something that can be achieved by buying a platform off-the-shelf. Cybersecurity teams need to integrate multiple platforms and technologies to ensure zero-trust policies are enforced ... Read More
May 20, 2024
Security Boulevard
The Promise and Perils of AI​

The Promise and Perils of AI​

AI presents both opportunities and challenges for security professionals and development teams. Snyk’s Edgar Kussberg will discuss the pitfalls AI can bring to secure development and will highlight key stats from Snyk’s recently released 2023 State of AI report to show how security teams can boost productivity while managing risk ... Read More
May 7, 2024
Snyk

Application Security Check Up