×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Core Principles of Identity Security for Software Developers

March 22, 2024

The ever-evolving landscape of software development brings not only automation and AI but also new security challenges. While technology has automated many tasks, the human element remains a significant factor in software supply chain security risks. Developers now play a pivotal role in deciding which software libraries become part of the supply chain and have access to powerful non-human or workload identities.

These shifts have raised important questions for developers: What do they need to know about identity security to safeguard their applications and their organizations from potential breaches?

In this webinar, the authors of the upcoming O’Reilly book, "Identity Security for Software Development," will explore essential identity security concepts in a practical and actionable manner, making them relatable for developers.

Join us to hear more about:

Common identity security pitfalls that developers must watch out for.
Tips and strategies for achieving regulatory compliance effortlessly.
Real-world case studies illustrating how identity security can either make or break an application.
Actionable steps you can immediately implement to secure your application identities.

Speakers:
John Walsh, Principal Developer Security Expert, CyberArk
Robert Sawyer, Sr. Director, Solution Marketing, CyberArk
Uzi Ailon, VP DevSecOps Solutions, CyberArk

Previous Article
New Secrets Management Capabilities: CyberArk Secrets Hub, CyberArk Conjur Cloud, CyberArk Conjur Enterprise, CyberArk Credential Providers
New Secrets Management Capabilities: CyberArk Secrets Hub, CyberArk Conjur Cloud, CyberArk Conjur Enterprise, CyberArk Credential Providers

Secrets Management, Secrets Hub, Conjur, AWS Secrets Manager, Azure Key Vault, Kubernetes

Next Video
Why Just Securing Human Identities Is Not Enough
Why Just Securing Human Identities Is Not Enough

In this session you'll learn why you need to secure both your human and machine identities, as well as the ...