Resources

Filters

Webinar

The Impact of Penetration Testing on Organizational Cybersecurity Posture

To address today’s dynamic and expanding attack surface, organizations are increasing their testing cadence and selecting testing level due diligence based on the criticality of assets under review. What else can we learn from four years and 3,100 pen tests across almost 1,600 clients, plus analysis of more than 5,000 mobile apps from NowSecure?

October 11, 2022

  • Cybersecurity
  • Cyber Risk Advisory

Webinar

FedRAMP®: Smarter, Faster, and With Maximized Results

In this panel discussion webinar, experts from AWS and Coalfire explore the latest best practices to simplify and accelerate the FedRAMP process through strategic planning and technical innovations.

September 26, 2022

  • Compliance

Webinar

How to Grow from DevOps to DevSecOps

Some dev and security teams just can’t get along. Others, however, might both have good intentions but don’t have the right operations, people, processes, or technology to help make a DevSecOps team really sing. Access this webinar to hear the first steps you can take.

August 29, 2022

  • Application security

Webinar

Scaling Up DevOps for the Full Enterprise

In this webinar, learn techniques and tools to adapt DevOps strategies to deliver results regardless of size, scope, and security needs of the organization.

August 29, 2022

  • Application security

Webinar

Preparing Your Response to the "Next4Shell"

Join Coalfire and Contrast Security to learn about the latest developments regarding these existing vulnerabilities, and best practices to prepare your organization for the next one.

June 30, 2022

  • Application security
  • ThreadFix®

Webinar

Accelerating Software Development with Security Context

In this webinar, we discuss best practices for using security context as a means to accelerate software development. Learn how an evidence-based approach to prescribing targeted developer security education builds stronger development teams that avoid introducing security vulnerabilities in the first place.

May 6, 2022

  • Cybersecurity
  • Application security