This Stream includes all Threat Stack webinars
Cloud Native DevOps: Securing Modern Applications
Threat Stack's Todd Morenau sits down with the authors of the new O’Reilly Media book “Cloud Native DevOps with Kubernetes: Building Deploying and Scaling Modern applications in the cloud".
Inside an Enterprise Breach on a Public Cloud Environment
Threat Stack CSO walks through the steps of a recent public cloud breach while discussing trends in the rising sophistication of malicious actors and how to monitor your own infrastructure.
Request a Demo of Threat Stack's Cloud Security PlatformGet in Touch
Draft and Develop: A Solution to the Cyber Security Skills Shortage
Learn how Outreach CISO developed an apprenticeship program to draft and develop security talent internally
Manage Decades of Technical Debt More Effectively
Visualizing Detection and Remediation in the Cloud
Threat Stack CSO and Graylog CTO discuss how to manage data logs across internal apps and third party vendors and how to analyze risk trends overtime using Threat Stack and Graylog
Who Watches the Watchers: How a Security Company Does Security
How does a security company do security? Learn how Threat Stack automates security into day-to-day processes - making the our organization simultaneously more secure and efficient.
Cyber Attack Simulation: A Crypto Crime in Action
See first-hand how hackers bypass security controls and execute a crypto mining attack. Then watch how a security engineer is able to quickly identify the attack before it becomes a breach.
How Sigstr Wins Business through Security
Learn how Sigstr builds customer trust and wins business through security with AWS and Threat Stack
How to Build and Mature a SecOps Program in the Cloud
Watch this video for practical advice to help you build and mature a cloud secops program for your organization.
Pick Any Three: Good, Fast, or Safe. DevOps from Scratch
Good, fast, or safe? DevOps means you don't have to choose. Threat Stack's Head of Ops, Pete Cheslock, gives advice on turning ideas into reality while maintaining quality & security through DevOps
How to Achieve Type 2 SOC 2 with Zero Exceptions
Do you have the chops needed to pass Type 2 SOC 2 with zero exceptions? Watch this video for advice from our Head of Ops and Sr. Infrastructure Security Engineer who recently went through the process.
52% of Companies Sacrifice Cybersecurity for Speed
Recent Threat Stack survey finds that over 50% of companies cut back on security to meet a business objective. Watch this webinar to learn about the misalignment and how you can overcome the obstacles
T-72 Hours to Report a Breach: Are you GDPR Ready?
GDPR deadlines are fast approaching and many US companies are behind the curve. Watch this video to learn how you can take a practical, manageable, and cost-effective approach to dealing with GDPR.
Strategies for Monitoring and Measuring in the Cloud
Watch this video to learn how to evaluate and measure security in the cloud, and how you can work with service providers to improve it.
5 Security Questions Your SaaS Business Should be Prepared to Answer in 2018
Watch this on-demand webinar to learn from Threat Stack's CSO, Sam Bisbee, about the top security concerns of 2018 and how you can create an actionable plan to address them.
Lean Cloud Security
Check out this video to learn how Allocadia's CISO utilizes a lean security strategy by automating processes and selecting the right tools for his security stack.
Low Cost Cloud Security Practices with Big Payoffs
Watch this on-demand webinar to hear about low cost, yet high impact, security practices for your cloud environment, infrastructure, workloads, and users
Securing Your Non-Production Environments
Watch this video to learn more about the importance of securing non-production environments and how to get started today.
Automating Cloud Security and Compliance
Watch this video to learn more about security and compliance in the cloud and how to get visibility and intrusion detection in your cloud environment.
AWS Webinar: How Genesys Cut Time to Security Incident Detection
Watch this on-demand webinar to learn how Genesys' security and ops teams worked together to cut time to security incident detection, meet compliance requirements, and automate security workflows