Threats, Attacks, and Vulnerabilities: Your Guide to Building a Security Strategy for Cloud Applications | Datadog
Threats, Attacks, and Vulnerabilities: Your guide to building a security strategy for cloud applications header image

Threats, Attacks, and Vulnerabilities:
Your guide to building a security strategy for cloud applications

Datadog Webinar

Threats, Attacks, and Vulnerabilities: Your guide to building a security strategy for cloud applications header image

Threats, Attacks, and Vulnerabilities:
Your guide to building a security strategy for cloud applications

This event has ended. Sign up now to watch on-demand.

The technology industry used to say that “leading IT” was the toughest job in the world. That was before roles like the CISO, CSO, BISO, and VP of Security became responsible for securing ever-growing dynamic environments while continuously facing new compliance legislation, vulnerabilities that pile up at the speed of DevOps, and an overall shortage in cyber skills.

In this special edition webinar you’ll hear from Ami Dave, CISO of Fanatics about how Datadog enables Fanatics to scale securely. In this discussion, you’ll learn about:

  • How Datadog enables Fanatics to scale securely
  • Top security risks and signals that leaders should be keeping in mind
  • Datadog product developments and technical demos
  • Speakers

    event/amidavefanatics.png

    Ami Dave

    Chief Information Security Officer, Fanatics

    event/andrewkrug2024.png

    Andrew Krug

    Manager, Advocacy - Security & Compliance, Datadog

    event/zackallenheadshot.png

    Zack Allen

    Senior Director Security Detection and Research, Datadog

    event/nakulvenkatesh.png

    Nakul Venkatesh

    Senior Product Manager - Application Security, Datadog

    event/danielblazquez.png

    Daniel Blazquez

    Senior Product Manager - Application Security, Datadog

    Sign Up To Watch On-Demand