On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

In this program, our expert speakers will discuss five key areas to ensure your cloud security coverage is complete. We’ll dive into unique challenges that come with securing complex cloud environments and provide you with streamlined strategies to address them. Plus, we’ll show you how to leverage the data you ... Read More
April 5, 2023
Lacework

Securing Kubernetes With SentinelOne and AWS

Join builders from SentinelOne and Amazon Web Services (AWS) for a live webinar where they’ll provide practical approaches to securing your Kubernetes clusters. This session will cover common attack vectors, security considerations when choosing a Kubernetes platform and strategies and best practices for detecting and resolving security incidents. You’ll also ... Read More
April 5, 2023
SentinalOne

Key Strategies for a Secure and Productive Hybrid Workforce

In the current hybrid workforce environment, organizations are in a constant battle to balance security and productivity. Legacy architectures aren’t sufficient for today’s work-from-anywhere, distributed teams, but most organizations struggle to modernize to address security and productivity challenges. To optimize for remote and in-office users, organizations need to provide secure ... Read More
April 4, 2023
Zscaler

Software Supply Chain Security

In the wake of a series of high-profile breaches, it’s become apparent how vulnerable software supply chains really are. Cybercriminals have increased their efforts to compromise developer credentials so they can embed malware in software components that can be activated downstream when they’re included in an application. Cybersecurity teams are ... Read More
March 20, 2023
Security Boulevard

SaaS-Based Container Networking and Security on Amazon EKS

Organizations are adopting Kubernetes on Amazon Web Services (AWS) to modernize their applications. But Kubernetes clusters and application life cycles demand a considerable investment of cost and resources, especially for edge applications. Rafay’s SaaS platform, hosted on AWS Elastic Kubernetes Services (EKS), helps DevOps and platform teams deploy, scale and ... Read More
February 28, 2023
AWS w/ Tigera

Three Steps to Software Supply Chain Security Success in 2023

Join software security experts as they walk through 3 steps for securing your software supply chain and achieving security mandates in 2023 ... Read More
February 22, 2023
ActiveState

Headwinds, Crosswinds and Tailwinds: Securing the Cloud in Turbulent Times

As we head toward an unpredictable 2023, Prisma® Cloud CSO Bob West and senior director of product marketing Charles Goldberg sit down to chat about cloud security as it relates to current events. West and Goldberg unpack the conversations happening among IT professionals, business leaders and at the board level ... Read More
February 21, 2023
Prisma Cloud by Palo Alto Networks

Where Will DevSecOps ‘Shift’ Next?

DevOps is terrific for delivering new innovative applications to the market. But the newer trend of “shift left, shift right, shift everywhere” has increased the pressure on developers and DevOps engineers to add application security (AppSec) testing and tooling management in CI/CD pipelines to their already long list of responsibilities ... Read More
February 15, 2023
Synopsys

Understanding Cyber Insurance Identity Security Requirements for 2023

In this program, we’ll take a deep dive into both the risk management and identity protection aspects of the new cyber insurance requirements ... Read More
February 15, 2023
Silverfort

AI in Machine Learning

Cybersecurity teams remain chronically overworked and short-staffed. It’s clear that AI must play a role in augmenting these cybersecurity teams, but there’s still a long way to go before AI models help level the playing field between cyberattackers and defenders. Many of the routine analytics tasks that are performed manually ... Read More
February 13, 2023
Security Boulevard