Executive Round Table: Building Security in a Software Factory

Application security is changing.  It’s not enough to just secure your custom code anymore.  We also need to secure the supply chain of open source and other third-party software.  And recently, attackers have discovered that by attacking the software factory itself, they can insert malicious code or trojans into applications and APIs before they are even deployed. Join...

Cyber Security Challenge for Startups

WHAT'S THE AGENDA?  Throughout the week, you’ll be learning how to use the Security 4 Startups tool to assess the security risks of your organization. Our hosts will walk you through various security controls on the checklist that fall into three categories: organization, IT infrastructure, and applications. You’ll learn what these controls mean and how...

Preparing for the Next Zero-Day Vulnerability

Watch Event Now Contrast Security | On-Demand Preparing for the Next Zero-Day Vulnerability Now that dust is settling from Log4Shell, how can you prepare for and prevent the next zero-day...