<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=113894&amp;fmt=gif">

Thought Leadership

VIDEOS & WEBINARS

Product Videos

60 Minute Product Demo
60-Minute Product Demo

Contrast Security Demo & Overview

Watch a demonstration of Contrast, presented by Jeff Williams, Contrast Security's Co-Founder & CTO in conversation with Ed Amoroso, former CISO of AT&T and Founder of TAG Cyber.
(1 hour)

Contrast Demo Video
9-Minute Product Demo

Contrast Security Product Highlights

Watch a short high-level overview and see for yourself how Contrast Security makes software self-protecting so it can defend itself from vulnerabilities and attacks. (09:08)

 
Product Video

Next Generation Application Security

Watch this short video and see how Contrast Security works with Agile and DevOps processes to accomplish maximum security at maximum speed for all application deployments. (01:06)

 
Product Video

DevOps Ready Security

Watch this short overview video and learn how Contrast Security enables DevOps teams to deliver security-as-code. (01:15)

 
60-Second Overview

Contrast High-level Overveiw

Watch this short overview video to see how Contrast uses instrumentation to deploy and more accurately identify application vulnerabilities in minutes, without experts or legacy SAST and DAST testing tools. (01:11)

 
Product Overview

Introduction to Contrast Protect

Watch this short overview video to see how Contrast Protect leverages Runtime Application Self-Protection (RASP) and patented deep security instrumentation to protect applications against cyber-attacks in real-time and make it the most accurate, fastest and scalable application security solution. (01:39)

 
Product Video

Contrast Security Advantages Over WAF – SQL Query Example

Watch this short video and see how Contrast Security protects applications and blocks SQL injection attacks better than WAF's. (01:17)

 
Product Video

Contrast Protect Advantages Over WAF

Watch first hand how Contrast Protect avoids the need for WAF's by working from the inside of a running application to provide better visibility and accuracy of finding and blocking attacks. (02:32)

 
Product Overview

The Contrast Advantage

Watch a short video of Jeff Williams, Co-Founder & CTO of Contrast Security, explaining what it means to have "self-protecting" software. (03:27)

 
Product Overview

Contrast Assess as Part of the SDLC

Contrast Assess (IAST solution) deploys an intelligent agent that instruments the application with smart sensors to analyze code in real time from within the application, without disrupting your process. (01:20)

 
Product Overview

Introduction to Contrast Assess

Watch this short overview video to learn how instrumentation works to find vulnerabilities, insecure libraries, and how it compares to other security testing methodologies. (01:27)

On-Demand Webinars & Conference Presentations

webinar-cloudsec-pivotal-2
On-Demand Webinar

Cloud-Native Security: Understanding the Why & How

Join Jeff Williams, Co-Founder & CTO of Contrast Security, and David Zendzian, CTO of Compliance and Security at Pivotal for a discussion on the best practices to ensure security is the key component of their cloud-native transformation at the speed of DevOps. (62:00)

webinar-carahsoft-gvmt
On-Demand Webinar

Modern Software Assurance Strategies for Government Agencies

Join Jeff Williams, Co-Founder & CTO of Contrast Security, to discuss the principles of DevOps with an innovative approach to IT security known as DevSecOps. DevSecOps introduces automated security much earlier in the software development life cycle (SDLC). This minimizes vulnerabilities and brings security closer to IT and government business objectives while accelerating certification and accreditation (C&A). (55:00)

On-Demand Webinar

What Works in Application Security: How to Detect & Remediate Application Vulnerabilities & Block Attacks

Traditional application security testing tools are too slow to meet the accelerated pace of today's business environment. In this webinar, we will discuss lessons learned and best practices with detailed metrics used to demonstrate the value of improved application security and faster security response using Contrast Security's testing tools. These application security testing tools include Contrast Assess to detect and remediate application vulnerabilities and Contrast Protect to block attacks. (47:00)

Resource Whitepaper
On-Demand Webinar

Under the Hood with Static Analysis - Fact vs Fiction

Tune in to this webinar to walk through the basics that support the static analysis field, such as semantic analysis and how data flow works between source and sink. We will also walk through the model structure that is built, how it is queried, and how it is impacted by different development techniques to give you a better understanding of how static analysis falls short of fulfilling your security needs. (40:00)

On-Demand Webinar

Securing Java Web Applications and APIs...in minutes...for FREE...Seriously!

Security tools have always been difficult, inaccurate, and frustrating, but what if there were a security tool that was as easy and powerful to use as AppDynamics? A security tool anyone can use to secure their own code, lock down open source libraries, identify attackers, and prevent exploits. In this webinar, Contrast's Co-Founder & CTO, Jeff Williams, will get you up and running with Contrast Security's Community Edition - FREE and full-strength application security solution for anyone to use. (44:00)

Resource Whitepaper
On-Demand Webinar

The DevSecOps Journey: Why It Starts with Agile, DevOps, & App Security

Traditionally, security has been an afterthought, or at the very least introduced late into the release process. Hence, security has been viewed as an impediment to high velocity Agile DevOps processes and becoming a primary bottleneck in the software delivery pipeline. This can cause major contention and distrust between development and security teams, but this doesn’t have to be the case. This webinar will highlight how modern, automated application security tools can help weave security into the code continuously and accurately throughout the SDLC. (45:00)

Video
On-Demand Webinar

Embedding Security in a Modern DevOps Pipeline – A Customer Perspective

Hear directly from a customer's perspective on how Beeline, the world leader in contingent workforce solutions, aligned Development, Operations, and Security practitioners to set up a fully automated CI/CD pipeline and incorporated application security early in the process. (1 hour)

Video
On-Demand Webinar

Targeted Defense: The Future of Defending Applications in Production

Development teams have struggled with massive security backlog with the inability to fix everything in code. Protecting your legacy applications is critical to your business and therefore necessary for your organization to have better production controls and faster zero-day response. Listen to this webinar to learn Contrast Security's new Targeted Defense Platform and capabilities using RASP technology. (1 hour)

On-Demand Webinar
On-Demand Webinar

Application Security Testing for an Agile & DevOps World

Security teams have a hard time keeping pace with software development in Agile and DevOps environments. With the majority of cybersecurity attacks focused on applications, automatically detecting vulnerabilities and protecting your applications from attack is critical. Listen to this webinar to learn the best practices in securing your software code and how to start developing a winning application security strategy. (43:00)

Equifax, Struts and You
On Demand Webinar

Equifax, Struts and You

The Equifax breach was a watershed moment for software application security. The root cause is confirmed to be a web application security issue tied to a widely used software framework called Apache Struts 2. To gain a better understanding of these events, listen to this webinar to learn how to shield yourself against Struts 2 attacks and how the team at Contrast Labs saw these issues and continues to see exploit attempts. (35:00)

scaling-devops
On Demand Webinar

Scaling Rugged DevOps to Thousands of Applications

In 40-minutes you'll hear how Tim Chase, Director of Application Security and Architecture at Nielsen, is scaling Rugged DevOps and achieving continuous protection during development and operations by instrumenting the software application portfolio, assessing and protecting applications in parallel, and deploying integrations that provide instant notifications. (42:00)

secure-government-web-applications
On Demand Webinar

Secure Government Web Applications

Hear Jeff Williams, Contrast Security Co-founder & CTO, discuss how government agencies can scale their DevOps functions by instrumenting their application portfolio, assessing and protecting applications in parallel, and deploying integrations that provide instant notifications. (1 hour)

 
Security Experts Insight

OWASP London DevSecOps Presentation

Jeff Williams, Contrast Security's Co-Founder & CTO, presents the “Three Ways of Security”, an interpretation of the DevOps classic, “The Phoenix Project”. In this video, you’ll learn how to get your security work flowing, create continuous security feedback, and create a culture of security experimentation and learning. (72:00)

Massive-java-webinar.jpg
On Demand Webinar

Massive Java "Zero Day": What is It and How to Fix It

Learn why the widespread flaw makes Heartbleed look tame. Additionally, learn how RASP technology is perfectly suited to protect applications vulnerable to Java deserialization exploits and many other types of attacks. (43:04)

5_Facts_About_RASP.png
On Demand Webinar

Demystifying Runtime Application Self-Protection – RASP

Gartner has recognized a new category of application security calling it Runtime Application Self-Protection (RASP). RASP is “transformational” because it enables new ways of securing business. But, how can applications protect themselves against attacks, especially if those protections weren’t built in by the app developers?
(1 hour)

sast-application-security
On Demand Video

What's Killing SAST?

See how a unique technology lets you build applications that accurately self-diagnose vulnerabilities and self-protect against attacks, without changing a line of code. (54:00)

OWASPbenchHIGHLIGHT1015.png
On Demand Video

OWASP AppSec Benchmarking Project: Astonishing Results

See how Contrast Security stacks up against the OWASP Benchmark in this on-demand video. The results are illuminating. (55:00)

IASTwebinarScreenShot0216.png
On Demand Video

IAST: AppSec at Agile Speed & Portfolio Scale

It is time to learn about interactive application security testing (IAST), a technology that is transforming the way businesses approach finding and remediating vulnerabilities. (1 hour)

Gene-Kim-Webinar.png
On-Demand Webinar

Cybersecurity Webinar with Gene Kim and Jeff Williams

Listen to Jeff Williams, Co-Founder of OWASP and Co-Founder & CTO of Contrast Security, in a lively conversation with Gene Kim, researcher, author, and Tripwire founder. Jeff and Gene discuss DevOps and continuous application security. (45:00)

Chief Information Security Officer.png
On-Demand Recording

Rich Licato, CISO, Airlines Reporting Corporation (ARC)

Listen to Jeff Williams, Co-Founder of OWASP and Co-Founder & CTO of Contrast Security discuss topics regarding risk and compliance in an overall security program. (21:12)

Interviews with Security Experts

 
Security Experts Insight

Cyber Security and Digital Transformation

Contrast Security CEO, Alan Naumann chats with former CISO of AT&T Ed Amoroso on the importance of software security, DevOps initiatives, and the future of digital transformation. (10:06)

 
Security Experts Insight

Realistic Approaches to AppSec & the Future of Cyber Security

Hear a conversation with Contrast Security's Co-Founder & CTO, Jeff Williams and former CISO of AT&T, Ed Amoroso, as they discuss how to approach application security and what the future of cyber security looks like. (10:18)

 
On the Street Interview

Instrumenting Application Security

In this video, hear Scott Parson, Senior Enterprise Security Architect of a Fortune 500 Financial Company, discuss the importance of continuous application security and how automation and cloud infrastructure has impacted his organizations approach to application security. (02:25)

 
On the Street Interview

Continuous Application Security with Tim Chase from Nielsen

In this brief video, hear Tim Chase, Director of Application Security and Architecture at Nielson, discuss the importance of continuous application security and what he thinks the future will hold for security testing, including DevSecOps. (02:15)

 
On the Street Interview

Investing in the AppSec Market

In this video, Jeff Williams, Co-Founder & CTO of Contrast Security, talks with John Monagle of General Catalyst, in regards to investing in application security, how the DevOps movement is changing the market, and Contrast Security's role in this transformation. (03:15)

 
Thought Leadership

Dark Reading Interview with Jeff Williams

Hear Brian Gillooly, VP of Events Content & Strategy, at Dark Reading in an in-depth conversation with Jeff Williams, Co-Founder & CTO of Contrast Security. Topics included revolutionary changes taking place in both application security and DevOps as well as Jeff’s prestigious nomination as one of the three finalists in the "Most Innovative Thought Leader" category for his work as a cyber security innovator. (12:57)

 
On the Street Interview

What does IAST mean to you?

Watch this short video and hear from Director of Test, John Scarborough on how he defines Interactive Application Security Testing (IAST). (00:39)

 
On the Street Interview

DevOps teams and AppSec?

Establishing a DevOps-ready security program is possible. In this video, hear from three folks who have successfully built and scaled the DevOps functions within their organizations. (01:31)

 
On the Street Interview

What does RASP mean to you?

Watch this short video and hear how Steve Herrod, Managing Director of General Catalyst Partners, defines and uses RASP technology as a decision-making tool. (00:35)

 
OWASP Benchmark

How it Works

Hear Jeff Williams, as he discusses the OWASP Benchmark Project in this short video. (05:38)