Welcome To Mend Webinars Center

Watch webinars about application security, DevSecOps, open source license compliance and audit

Choose Your Type

Choose Your Topic

Our Latest Webinars

Panel Discussion: Container Management: Configuration, Monitoring and More

The container space has evolved dramatically, growing into a thriving ecosystem that goes well beyond containers to include orchestration platforms, monitoring tools and more to enable end-to-end container management. In this webinar, we explore the expanding category of container management, including technology and market trends and the essentials an organization needs to manage its container...

Empowering Financial Institutions to use Open Source With Confidence

The days when financial institutions relied solemnly on proprietary code are over. Today, even the largest financial services firms have realized the benefits of using open source technology to build powerful, innovative applications at a reduced time-to-market. However, the financial services industry faces strict regulatory requirements that present it with a unique set of challenges,...

The Challenges of Scaling DevSecOps

Organizations enjoy the speed that DevOps brings to development and delivery. However, most security and compliance monitoring tools have not been able to keep up, becoming the most significant barrier to continuous delivery. Now some good news: you can easily integrate security into your existing processes to solve this challenge. In this session, Shiri Ivtsan,...

Panel: The Next Generation of Application Security

Application security is an effective tool for defending against attacks. But as IT infrastructures shift to “software-defined everything” and move to the cloud, traditional appsec models no longer are enough to protect the application. This webinar takes a look at how companies are addressing new models to address more dispersed and dynamically connected applications, from...

Taking Open Source Security to the Next Level

Join us for a webinar featuring Forrester VP and Research Director Amy DeMartine to learn more about why open source security has become critical for securing modern applications, the main considerations when evaluating an open source security and license compliance solution and what she sees in store for the future. Additionally, WhiteSource Senior Director of...

360° Kubernetes Security: From Source Code to K8s Configuration Security

Kubernetes has become the default way for many organizations to scale and orchestrate their use of containers. However, organizations are starting to find themselves needing to take the necessary steps to protect their containers. Automating security checks throughout the development life cycle can help reduce risk and allow organizations to develop and deploy securely. Join Shiri Ivstan, Senior Product Manager at WhiteSource and Yaniv Peleg Tsabari, Senior...

Deep Dive into Container Security

Many organizations are using containers to develop and manage their applications. Containers enable development teams work faster, deploy more easily and efficiently, and operate at a much larger scale. However, there are many security measures that need to be taken across the entire software development lifecycle, especially when it comes to open source security. In...

Panel Discussion: 10 Tips for Achieving Cultural Change in DevOps

DevOps success depends on three things: people, processes and tools. While tools and processes can be easy enough to address, the people part of the equation can be more difficult to tackle. Changing the culture of an organization can be akin to turning a cruise ship midstream. Join this webinar to hear the top 10...

Panel: DevOps Takes On The World

DevOps is a global phenomenon, with organizations in countries far and wide adopting DevOps tools, processes and culture to increase the speed, efficiency and reliability of their applications. In this webinar, we’ll delve into why DevOps has such a global reach and take a look at some of the international companies that have found success...

Transforming from DevOps to DevSecOps at Scale

Many security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy orders of magnitude faster than human gating can achieve. Similarly, security groups believe that policy enforcement is their biggest (only?) lever… “If we can just update the...

Container Security at the Speed of CI/CD

DevSecOps is often associated with securing a development pipeline in traditional CI/CD frameworks. Join this session, held by Henrik Johansson, Principal – Office of the CISO at AWS, as he discusses and shows: – how public cloud technology enables you to fully embrace security automation in your infrastructure – how to account security using managed...

Lessons Learnt By An Agent Of Chaos From DevOps

Is your organization ready to embrace a DevOps mindset? Receive a pragmatic view from an agent of chaos, who’s promoting the goal for a single continuous integration and delivery pipeline, shifting testing, security, code reviews, and other opportunities to improve information sharing and quality to the left, shifting configuration to the right, and most importantly,...

DevSecOps In The Cloud Is More Than Just CI/CD

DevSecOps is often associated with securing a development pipeline in traditional CI/CD frameworks. Join this session, held by Henrik Johansson, Principal – Office of the CISO at AWS, as he discusses and shows: – how public cloud technology enables you to fully embrace security automation in your infrastructure – how to account security using managed...

Securing Container-Based Applications at the Speed of DevOps

Thanks to containerization and automation, applications are being developed and delivered faster than ever. With tools such as AWS ECR, developers are able to store, manage and deploy Docker container images without having to worry about operating their own container repositories or scaling the underlying infrastructure. With this, however, arise challenges around managing the security...

Container Security: Securing from Within

Containers increase speed, simplify operations, improve development efficiency and bring a slew of other benefits, making them a top choice for agile deployment infrastructure. In our latest panel webinar with Container Journal, we outlined the critical importance of container security and provides best practices and tools to ensure your container environment is as secure as...

The State of Open Source Security Management

It is no secret – open source has become the main building block in modern applications, and it is almost impossible to develop software at today’s pace without it. However, as the open source community grows, and the number of reported vulnerabilities keeps climbing, manually verifying the security and compliance of open source components can...

Improving Security in a Devops World

application security is becoming a key area of focus for organizations. Join this interactive Q&A panel of industry experts to learn more about: – How to integrate application security testing into the DevOps process early on – Why automation, speed and coverage are critical to the success of DevSecOps programs – Speed vs Security: Where...

Securing the Code: DevOps Security and AppSec

DevSecOps represents a fundamental shift from the status quo by making security a much more collaborative effort. Applications are the business in this digital age. Securing the applications that drive your business is essential to providing safe digital experiences to your entire business ecosystem. With DevSecOps, security is automated and integrated into the development process....

Security at the Speed of Software Development – a lean-agile approach to achieving DevSecOps culture

DevSecOps offerings that are just DevOps lipstick on a traditional security-as-a-gate pig. Also, security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy an order of magnitude or more faster than human gating can achieve. What’s needed to...

RSA 2018- What’s Hot in the Cyber Security Space

Love it or hate, the annual RSA Conference (RSAC) in San Francisco is the largest cyber security conference in the world. It is where the world comes to talk and learn security. Inevitably every year at RSAC there are some technologies that become the industry buzzwords and hot buttons. These generally stay on top of...

SC Magazine – 5 Things Every CISO Needs To Know About OS Security

Open Source has become the key building block for application development in today’s market, where companies are under constant pressure to accelerate time to market. The increasing adoption of open source components, however, has introduced new security challenges that most teams are not prepared to mitigate in their current posture. In this webinar, we will...