DevSecOps Live Webinar: Embedding Security Into Your DevOps Practices

As technology continues to accelerate so too do the threats of cyberattacks against organizations. These threats continue to grow in frequency and complexity year over year, putting increasing pressure on DevOps teams to build securely while still maintaining fast moving deployment schedules. To embed security into the fabric of the software development lifecycle and be […]

FFCON21 Breaking Barriers: Building blocks of a security program for companies with applications in the Cloud.

According to *Verizon, web applications were involved in 43% of breaches in 2020. **IBM also reported that 52% of breaches were caused by malicious attacks against applications last year.  These statistics highlight the importance for modern technology companies building web and mobile cloud-hosted apps to have a comprehensive information security program that covers application and cloud security as well as corporate governance and risk management.  *Source: […]

Technology Due Diligence Process and Cyber Security Risks

Tune in on Friday, May 21st, 2021 for an insightful conversation regarding the Technology Due Diligence process and risks that are crucial for investors, M&As, and preparing your company for acquisition.  Hear from Daniel Lee (Managing Director of Technology & Innovation in Mid-Market Investment Banking at CIBC), Michael Castro (Founder & Risk Executive at RiskAware […]

Executive Round Table: Building Security in a Software Factory

Application security is changing.  It’s not enough to just secure your custom code anymore.  We also need to secure the supply chain of open source and other third-party software.  And recently, attackers have discovered that by attacking the software factory itself, they can insert malicious code or trojans into applications and APIs before they are even deployed. Join […]

Cyber Security Challenge for Startups

WHAT'S THE AGENDA?  Throughout the week, you’ll be learning how to use the Security 4 Startups tool to assess the security risks of your organization. Our hosts will walk you through various security controls on the checklist that fall into three categories: organization, IT infrastructure, and applications. You’ll learn what these controls mean and how […]