Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

On-Demand Webinar

Stop Policy Violations at the Source

Fixing security misconfigurations in the IaC you use to provision cloud services

On-Demand

Grab a coffee or your favorite beverage and join us for a bi-weekly, technical discussion exploring ways you can effectively address a range of cloud security challenges using Tenable Cloud Security.

Calling all vulnerability and threat management pros, cloud architects and engineers, DevSecOps and cloud operations leaders seeking guidance and insights for gaining control over key cloud security challenges – especially in the context of an overall exposure management program. This session has your back.

In this on-demand session John and Robert explore ways you can stop policy violations at the source by easily scanning IaC and Git repositories with Tenable Cloud Security.

Speakers

Photo of John Tonello, Cloud Security Advocate, Tenable

John Tonello

Cloud Security Advocate, Tenable

Robert Maury, Senior Security Engineer, Tenable

Robert Maury

Senior Security Engineer, Tenable

Register for Webinar

Watch On-Demand Now.