On-Demand Webinars

Welcome to SecurityBoulevard.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience. Registration is free. Enjoy!

Identity and Access Management

Identity and Access Management

As organizations look to implement zero-trust IT policies, many have come to realize that identity is the new perimeter to be defended. The challenge is most of them rely on antiquated approaches to identity and access management (IAM). Come learn how organizations can modernize IAM in a way that makes ... Read More
July 24, 2023
Security Boulevard
Harnessing Next-Gen Identity Security Solutions for Today's Threat Landscape

Harnessing Next-Gen Identity Security Solutions for Today’s Threat Landscape

Mark your calendars for an expert-led session on the pivotal role of next-generation identity security. Discover how to revolutionize your cybersecurity defense strategy with the ability to restrict credential misuse, misdirect reconnaissance efforts and disrupt lateral movement within your network ... Read More
July 12, 2023
SentinelOne
Strange Bedfellows: Software, Security and the Law

Strange Bedfellows: Software, Security and the Law

During this live panel roundtable, experts from security, software and legal disciplines discuss some of the top cyberlaw and legal topics affecting software supply chain security ... Read More
June 29, 2023
Mend
Unleash the Potential of Your Log and Event Data, Including AI’s Growing Impact

Unleash the Potential of Your Log and Event Data, Including AI’s Growing Impact

In this Techstrong Learning Experience, Techstrong Research GM Mike Rothman and André Rocha, VP Product & Operations from ChaosSearch, will share insights from a recent Techstrong audience poll on this topic, and discuss the most pressing challenges and solutions, including the inevitable and significant impact of Generative AI ... Read More
June 22, 2023
ChaosSearch
Securing Containers & Kubernetes With AWS And Calico

Securing Containers & Kubernetes With AWS And Calico

In this program, we will walk you through the container threat landscape and why there is a need for a new approach to container and Kubernetes security ... Read More
June 15, 2023
AWS w/ Tigera
Enrich Security Investigations With ServiceNow Asset Data in Snowflake

Enrich Security Investigations With ServiceNow Asset Data in Snowflake

Asset and inventory control solutions are difficult to build and maintain. Many organizations spend lots of time, effort and resources to get ahold of their inventory of assets, but few are able to effectively leverage their asset inventory data to enrich security operations. Snowflake’s IT and security teams leverage ServiceNow ... Read More
June 14, 2023
Snowflake
Uncovering the Hidden Cybersecurity Threat in Your Organization

Uncovering the Hidden Cybersecurity Threat in Your Organization

By attending this event, participants will unlock valuable insights and practical strategies to confront non-federated application risks, prioritize security, avert breaches and regain control over financial and operational impacts ... Read More
June 13, 2023
Cerby
ActiveState Workshop: Building Secure and Reproducible Open Source Runtimes

ActiveState Workshop: Building Secure and Reproducible Open Source Runtimes

In this follow-along workshop, we’ll use the ActiveState Platform to set up an example of Python machine learning (ML) runtime with security baked in and consistently applied across operating systems to show how your dev team can get up and running in minutes – pain-free ... Read More
June 8, 2023
ActiveState
Malicious Packages Special Report: Attacks Move Beyond Vulnerabilities

Malicious Packages Special Report: Attacks Move Beyond Vulnerabilities

Join VP of Product Management, Jeff Martin and Principal Product Architect, Maciej Mensfeld as they dig into the findings from the Mend Malicious Packages Special Report and discuss how Mend.io’s 360-degree malicious package protection can help defend against this insidious threat ... Read More
May 30, 2023
Mend
Resilient And Secure Service Mesh On Amazon EKS And Tetrate Service Express

Resilient And Secure Service Mesh On Amazon EKS And Tetrate Service Express

You’ve successfully deployed services on EKS. So, what’s next? For most organizations, high availability, service-to-service encryption and service discovery are must-haves. Istio has rapidly become the de facto standard service mesh for organizations looking to deliver on these key needs: High availability, encryption and simplified service discovery. And while a ... Read More
May 25, 2023
AWS w/ Tetrate