Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Rechercher Ressource - BlogRessource - WebinaireRessource - RapportRessource - Événementicons_066 icons_067icons_068icons_069icons_070
Back to webinars
Webinaire à la demande

Mettez fin aux violations de politique à la source

Fixing security misconfigurations in the IaC you use to provision cloud services

À la demande

Prenez un café et installez-vous pour une discussion technique bi-mensuelle autour des méthodes permettant de faire face à toute une série de défis de sécurité dans le cloud à l'aide de Tenable Cloud Security.

Calling all vulnerability and threat management pros, cloud architects and engineers, DevSecOps and cloud operations leaders seeking guidance and insights for gaining control over key cloud security challenges – especially in the context of an overall exposure management program. This session has your back.

In this on-demand session John and Robert explore ways you can stop policy violations at the source by easily scanning IaC and Git repositories with Tenable Cloud Security.


Intervenants

Photo of John Tonello, Cloud Security Advocate, Tenable
John Tonello

Cloud Security Advocate, Tenable

Robert Maury, Senior Security Engineer, Tenable
Robert Maury

Senior Security Engineer, Tenable

Register for Webinar

Watch On-Demand Now.
× Contact our sales team