Beyond shift left: Tackling the new wave of threats with on loop security | SASIG
Forgotten your password?

Thursday 26 September 2024, 2pm-3pm (BST)

In the rapidly evolving landscape of cloud security, the traditional approach of shifting left—focusing on the early stages of development—has proven insufficient in addressing the dynamic threats faced by modern enterprises. This presentation challenged the prevailing wisdom and advocated for a more holistic and adaptive strategy that integrates security throughout the entire lifecycle of cloud workloads from build-time to runtime.

Recent threats such as Solar Winds, Dependency Confusion, and more have suggested that new waves of attacks are focusing on injecting malicious code rather than exploiting known vulnerabilities. This facilitates the need for an on loop approach which connects runtime threat detection & response to tracing down how your applications and software are built in the developer pipeline. By tracing malicious activities like crypto mining, malware, and reverse shells back to their sources in code, we can address these new waves of supply chain attacks.

Attendees learned the importance of unifying risk findings through deep runtime analysis and correlating these insights with contextual data in your development pipeline, including GitHub activity, build provenance, and context of your cloud and Kubernetes deployments. We then discussed pathways for building secure development pipelines and only allowing secure deployments into production with a policy-driven approach.

Watch the recording to discover why a shift-left approach is not enough and how adopting a continuous, comprehensive cloud security strategy can better protect your enterprise against evolving threats. This session was designed for security analysts and enterprise leaders looking to stay ahead in the cloud and runtime security game.

 

Chaired by

Martin Smith MBE (info), Chairman & Founder, The SASIG

 
Presented by

Abhinav Mishra (info), Director of Product Management, Uptycs

Log in to watch the webinar on demand


Log in here
This website uses cookies, by continuing to use the site you agree to using cookies. Continue