Events
![](https://cdn-dllid.nitrocdn.com/lfaFdmeTaONuMeYAvisIiEiZRrNJpVpd/assets/images/optimized/rev-3c09665/anchore.com/wp-content/uploads/2024/06/techstrong_devsecops.png)
DevSecOps – Editorial Roundtable
As the importance of securing software supply chains continues to grow, DevSecOps practices are being increasingly adopted to meet this demand. The challenge lies in optimizing these processes to ensure developers embrace them without compromising the speed of application development and deployment.
Join us for an insightful webinar where we bring together application development and cybersecurity teams to explore how to shift application security further left in the development process as seamlessly as possible. This roundtable discussion will provide valuable insights and practical strategies to enhance the security of your software supply chains.
Key Takeaways:
- Effective DevSecOps Integration: Learn how to seamlessly integrate security practices into your development process without slowing down application deployment.
- Overcoming Implementation Barriers: Gain insights into the common challenges faced during DevSecOps implementation and strategies to overcome them.
- Optimizing Security Processes: Discover best practices for optimizing security measures that developers will embrace, ensuring robust and efficient software supply chains.
![](https://cdn-dllid.nitrocdn.com/lfaFdmeTaONuMeYAvisIiEiZRrNJpVpd/assets/images/optimized/rev-3c09665/anchore.com/wp-content/uploads/2024/07/Anchore_august_webinar2024.png)
Adopting the DoD Software Factory Model: Insights & How Tos
The Department of Defense (DoD) software factory model has emerged as a cornerstone of innovation and security in the rapidly evolving landscape of national defense and cybersecurity. Software factories represent an integration of principles and practices found within the DevSecOps movement, including the US Navy’s RAISE 2.0 Implementation Guide, with technical guidelines to support continuous cyber-readiness with real-time visibility.
What are the building blocks for adopting a software factory model successfully? What insights can we draw from Platform One and Black Pearl?
Together, Anchore’s Brian Thomason, Manager of Partner and Solution Engineering, and Michael Simmons, Senior Solutions Architect, will uncover how a software factory can standardize secure software development and deployment. Learn how tool selection and operational procedures play a critical role in the DevSecOps transformation process.
In this live webinar we will demonstrate how Anchore Enterprise:
– Automates policy enforcement and security checks
– Automates vulnerability scans at each step in the development lifecycle
– Saves time with out-of-the-box policy packs for DoD standards
![](https://cdn-dllid.nitrocdn.com/lfaFdmeTaONuMeYAvisIiEiZRrNJpVpd/assets/images/optimized/rev-3c09665/anchore.com/wp-content/uploads/2024/07/CMCC_webinar_Carahsoft2024.jpeg)
Carahsoft: Automated policy enforcement for CMMC with Anchore
CMMC is an important program to harden the cybersecurity posture of the defense industrial base, and implementation can be a challenge for teams that are not familiar with automating compliance measures. Many of organizations that are required to comply with CMMC have the responsibility to protect the sensitive data of the US military and government agencies as they support various missions of the United States, making timely compliance a critical component to business operations.
Many aspects of CMMC are similar to NIST’s SSDF framework that requires software producers to provide a signed attestation to verify development work, ensuring transparency and security of software components. One common theme across both is the need to validate security between DevSecOps pipelines and software supply chain.
This session will explore the evolving areas of CMMC and SSDF compliance parameters and demonstrate how Anchore Enterprise automates security best practices, like policy enforcement.
We will demonstrate:
– How to implement and automate compliance controls
– How to rely on automation to conduct vulnerability scans
– How to meet and exceed the benchmarks set by CMMC and NIST
– Which controls Anchore Enterprise automates for CMMC and NIST