Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Core Principles of Identity Security for Software Developers

Webinar

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
2:00pm EST |  Tuesday, December 19
11:00am CET |  Tuesday, December 19
2:00pm SGT |  Tuesday, December 19

The ever-evolving landscape of software development brings not only automation and AI but also new security challenges. While technology has automated many tasks, the human element remains a significant factor in software supply chain security risks. Developers now play a pivotal role in deciding which software libraries become part of the supply chain and have access to powerful non-human or workload identities.

These shifts have raised important questions for developers: What do they need to know about identity security to safeguard their applications and their organizations from potential breaches?

In this webinar, the authors of the upcoming O’Reilly book, "Identity Security for Software Development," will explore essential identity security concepts in a practical and actionable manner, making them relatable for developers.

Join us to hear more about:

  • Common identity security pitfalls that developers must watch out for.
  • Tips and strategies for achieving regulatory compliance effortlessly.
  • Real-world case studies illustrating how identity security can either make or break an application.
  • Actionable steps you can immediately implement to secure your application identities.

Speakers:

  • John Walsh, Principal Developer Security Expert, CyberArk
  • Robert Sawyer, Sr. Director, Solution Marketing, CyberArk
  • Uzi Ailon, VP DevSecOps Solutions, CyberArk

REGISTER NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.