Multi-vendor Webinar Schedule

Sponsor an Upcoming Webinar!

CyberEdge hosts multi-sponsor webinars pertaining to dozens of IT security technologies, services, and topics of the day. Participating in one of our webinars is an easy, cost-effective way to generate quality leads. Select one or more topics below to view relevant upcoming webinars. Then contact your CyberEdge sales representative for more information or to sign up.

Container / Kubernetes Security

  1. Events
  2. Container / Kubernetes Security

Views Navigation

Event Views Navigation

Today

From Blind Spots to Proactive Defense: Winning the Web Applications Security War

Imagine your most trusted web applications turning against you—because they very well may be. Threat actors are exploiting hidden vulnerabilities, turning essential tools into launchpads for data breaches and operational chaos. As cyberattacks grow more sophisticated, securing web applications is critical to protecting your organization. Learn how to uncover and eliminate application security blind spots, implement defense-in-depth strategies, and leverage advanced tools to detect and block evolving threats. Safeguard both legacy and modern web applications, and ensure your organization stays ahead in an era of relentless cyberthreats.
Topics:
, , , , , ,

DevSecOps: Fortifying Web Applications from Code to Deployment

Web applications are the backbone of modern business, but each line of code can introduce potential vulnerabilities. Building secure applications requires more than reactive security checks—it demands integrating security into every step of the DevOps process. Join us to explore strategies and technologies to embed security practices into the software development lifecycle. Discover how a proactive DevSecOps approach reduces vulnerabilities, ensures compliance, and keeps your applications prepared to withstand evolving cyberthreats.
Topics:
, , ,

Fortifying Application Security: Tackling the Hidden Risk in Third-party Code

The vast majority of software code relies on third-party libraries, open-source components, and outsourced development. While these resources accelerate innovation, they introduce vulnerabilities and security risks that adversaries are eager to exploit. Join us as we spotlight the hidden risks in third-party code and explore practical methodologies and tools to assess and manage these security risks. Learn strategies for evaluating external code, managing legal and compliance challenges, and leveraging advanced security tools to detect and mitigate vulnerabilities. Ensure your applications remain secure, compliant, and resilient in an increasingly complex software ecosystem.
Topics:
, , , , , ,

From Code to Cloud: DevSecOps for Modern Application Security

Software powers modern enterprises, but rapid release cycles and complex architectures often prioritize speed over security, leaving critical vulnerabilities exposed. DevSecOps bridges the gap between development, security, and operations by integrating security practices across the entire software development lifecycle. Explore strategies to embed security into development pipelines, automate testing, and address risks from third-party dependencies. Are you ready to transform your DevSecOps approach and safeguard your applications against today's evolving threats? Join us to learn how.
Topics:
, , ,

Fast, Secure, Resilient: Modernizing Application Security at Scale

Software release cycles are now too fast for traditional security tools. Rapid iterations and reliance on open-source and cloud-native tech increase vulnerabilities, challenging AppSec teams to keep up. Attackers are taking advantage, targeting applications and exploiting misconfigurations, excessive permissions, and vulnerable plug-ins. Modern application security demands a proactive approach, integrating security seamlessly into fast-paced development pipelines. Join us to explore proactive strategies and solutions to modernize application security practices, address risk at every step of the software development lifecycle—and mitigate vulnerabilities before attackers can exploit them.
Topics:
, , , , , ,

DevSecOps Has a Speed Problem: Securing Code in the Age of AI

AI is no longer just a tool—it’s generating, integrating, and deploying code at machine speed, flooding pipelines with opaque, untested logic that legacy security tools were never designed to understand. To move forward, security teams must adopt new approaches that integrate Agentic AI, developer enablement, and secure-by-default practices. Topics include: • How AI-generated code is reshaping the software delivery pipeline • The new risks of generative development • Where DevSecOps workflows break under machine-speed development • Strategies for building trust into AI-augmented pipelines Whether you're leading transformation or managing risk, you’ll leave with strategies to modernize DevSecOps for the AI-coded future.
Topics:
, , ,

Cloud-native, Risk-resilient: Rethinking Application Security from the Inside Out

As applications grow more complex and development cycles accelerate, traditional AppSec approaches are falling short. What worked for on-prem apps won’t cut it in the cloud. Fragmented tooling, unclear ownership, and expanding attack surfaces make it harder to manage risk at scale. To build risk-resilient applications in cloud-native environments without compromising speed or scale, organizations must shift from reactive controls to embedded, adaptive defenses. Topics include: • Replacing legacy AppSec with cloud-native approaches • Managing risk across distributed dev teams and pipelines • Aligning security with DevOps from build to runtime Learn how to modernize your AppSec strategy to protect today’s applications—without compromising speed, scale, or agility.
Topics:
, , , , , ,

Burned by the Build: Closing the Loop Between Development and Security

When production incidents trace back to insecure builds, everyone loses—but many teams still treat security as a post-mortem, not a checkpoint. Security debt isn't just technical, it's operational—and it's growing as development accelerates and security teams fall behind. DevSecOps must evolve into a continuous, context-aware model that treats risk as an always-on priority. Topics include: • Catching security debt before it ships • Fixing disconnects in DevSecOps workflows • Embedding risk-aware feedback across the SDLC Join us for a candid look at what it really takes to make DevSecOps succeed.
Topics:
, , ,

Securing AI-driven Applications: Adapting AppSec for the Age of AI

Artificial Intelligence is accelerating and transforming how applications are built—introducing new code patterns, faster release cycles, and greater complexity. As AI-generated code becomes more common, traditional AppSec approaches are struggling to keep up. Security teams face growing pressure to identify emerging risks, adapt to shifting development practices, and secure applications without slowing innovation. Topics include: • Addressing new risks from AI-generated code • Adapting AppSec for AI-accelerated release cycles • Embedding security into AI-driven development workflows Learn how to evolve your AppSec strategy to secure AI-driven development—without putting speed or scalability at risk.
Topics:
, , , , , ,

Reducing Risk at Scale: A Modern Approach to Application Security

Application vulnerabilities are rising—and attackers aren’t waiting. The challenge isn’t just detection; it’s knowing what to fix first, and how fast. Traditional AppSec approaches often flood teams with data but lack the context to prioritize effectively. Security leaders need clarity, speed, and precision to reduce risk at scale. Application security programs must evolve to distinguish real threats from noise, streamline remediation, and enable faster, smarter decisions under pressure. Topics include: • Trends reshaping the application threat landscape • Strategies for intelligent prioritization and faster remediation • Embedding context into workflows to drive faster, smarter remediation Learn how to modernize your AppSec program to reduce risk at scale—without slowing down development.
Topics:
, , , , , ,