Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detection-as-Code: Frontline IR Intel for Faster, More Accurate SOC [Webinar Replay]

Threat intelligence can provide a rich insight into threat actor activity but often lacks the timelines and context that comes from the learning of real-life incident investigations. Security leaders need to know how to leverage this frontline intelligence to not only understand if they are likely to be in a similar situation but also to know how they could take immediate action on their defenses.

Mend.io Supply Chain Defender

Mend Supply Chain Defender helps protect enterprises against software supply chain attacks. It detects and blocks malicious open source packages before your developer can download them — and before they can pollute your codebase with malicious activity. Mend Supply Chain Defender has already detected and reported thousands of malicious packages that were swiftly removed from their registries, to protect open source users from accidentally installing malicious code.

Mend.io JIRA Security Dashboard Integration

Overview The Mend Jira Security Dashboard is a new option included in the Jira Cloud plugin that provides a centralized view of security issues and risks across all Jira projects, making it easier for you and your teams to prioritize and address security concerns. Use cases for the Jira Security Dashboard The Mend Jira Security Dashboard addresses the following scenarios: As an AppSec Manager, it is imperative to have real-time visibility into the overall security health of your development teams' applications within your issue-tracking tool, Jira.

The Role of Leadership in Successful DevSecOps Adoption

Customer Speakers: Woolworths | Pablo Reyes, AppSec Lead Shopback | Dipin Thomas, Engineering Manager Coinhako | Metarsit Leenayongwut, Engineering Manager Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

Embracing Cybersecurity's Spectrum: Your Journey to Finding the Right Role

Join Stephanie Chaplin as she unravels the diverse avenues of cybersecurity. From breaking barriers on the red team to safeguarding on the blue, find where you fit. Developers, even if not in security, can benefit. Transitioning from finance? Policy roles await. Discover your cybersecurity niche today!

Webinar: Insuring Your Digital Future - Understanding Cyber Insurance Requirements

With cyber threats becoming increasingly common, businesses of all sizes must be prepared to protect themselves from potential data breaches and other cyber attacks. Cyber insurance can be an important tool for managing these risks, but understanding the requirements of cyber insurance can be challenging. These requirements typically vary depending on the specific policy and insurer, but they often include factors such as the size and type of business, the industry in which the business operates, and the risk level associated with its IT infrastructure and data. In addition to meeting these eligibility requirements, businesses may need to comply with certain cybersecurity protocols and standards to maintain their coverage. This webinar will discuss these cyber insurance requirements and offer potential solutions for protecting your business from data breaches and other cyber threats.

ChatGPT DLP (Data Loss Prevention) - Nightfall DLP for Generative AI

**ChatGPT Data Leak Prevention (DLP) by Nightfall AI: Prevent Data Leaks and Protect Privacy** ChatGPT is a powerful AI utility that can be used for a variety of tasks, such as generating text, translating languages, and writing different kinds of creative content. However, it is important to use ChatGPT safely and securely to prevent data leaks, protect privacy, and reduce risk.

Coffee Talk with SURGe: 2023-AUG-08 Black Hat, Defcon, Tenable CEO, Zoom TOS, Acoustic Attacks

Join Ryan Kovar, Shannon Davis, and Audra Streetman for a special edition of Coffee Talk, live from Black Hat in Las Vegas! The team of Splunk security experts will recap some of the latest security news, including: Ryan and Audra also competed in a charity challenge about the risk of being hacked while at a hacking conference.