Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Unexpected Connections: The Future of Internet-Connected Spaces

In today's digital age, the concept of connectivity has transcended beyond our wildest imaginations. "Unexpected Connections: The Future of Internet-Connected Spaces" dives deep into the realm where anything and everything can be connected to the internet, including applications not traditionally approved by tech departments. 🏢🌍📲

A C-Suite View of Cloud DevSecOps Today and Tomorrow

Hear about trends of innovative security leaders and how developers and security practitioners can best collaborate together through aligned incentives and strong communication. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open-source projects and more.

Managing Cybersecurity Risk from the CI/CD Pipeline to the Board Room

In this panel conversation with leaders in cybersecurity, get advice and insights into navigating between IT and Security teams with the advancement of “shift left” concepts as security increasingly moves to development teams and DevOps grows in importance. Further, hear tips and advice on educating Board Audit Committees and Executive Leaders on cloud trends and risk focus areas to maximize investment and focus on the risks that matter to the business.

Breaking the Cloud to Build the Cloud

There’s no such thing as a perfectly secure cloud environment. Vulnerabilities, holes left open by misconfigurations, over-permissive roles, and more create a target-rich environment for attackers. Breaking the cloud for good is the job of these expert hackers. View this panel session to learn about offensive security techniques and tactics for breaking the cloud to build the cloud better.

Securing the Supply Chain - Automating our Way Out of Security Whack-a-Mole

Open-source components forever changed how we build software, but they are also a prominent security threat, nothing illustrated this better than the recent XZ library incident where the world narrowly avoided a massive supply chain attack. Join Gene Gotimer and Mackenzie Jackson to discuss how we can keep our open-source supply chains secure as we discuss: Security implications of vulnerable open-source components How using automation can help us move toward a secure supply chain How to discover and detect vulnerable components.

Maximizing Security Investment: Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role. However, navigating the array of deployment options and pricing structures can be daunting, making it challenging to accurately calculate ROI. In this webinar, Vivek Gopalan (VP of Product Management at Indusface) unravels the intricacies of estimating ROI for WAAP.

Scaling Privileged Access for Modern Infrastructure Real World Insights

Implementing and scaling privileged access in modern computing environments generates new challenges for security and engineering productivity. Modern computing architectures are ephemeral, elastic, on-demand, and complex. This webinar delves into the challenges faced by platform engineering and infrastructure teams when enabling secure access in these environments.