<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">


Think About Your Audience Before Choosing a Webinar Title

Sponsored by:


On Demand

Is your CI/CD pipeline really secure? The speed and automation of CI/CD delivers immense business value, but also introduces new security risks. Organizations adopting CI/CD for speed often overlook security, resulting in risky anti-patterns like poor pipeline hygiene, unvetted open source dependencies and lack of secrets management. The security of your CI/CD pipeline is critical, but how do organizations approach securing this complex process?

Join us for this interactive webinar to discuss key considerations around CI/CD security and anti-patterns through our panel of experts, PulseMeter research results and interactive Q&A.

Join us and learn about:

  • Anti-patterns that give us a false sense of CI/CD security
  • Where pipelines are most vulnerable
  • Pipeline poisoning and how to avoid it
  • Proven security best practices
  • How your peers are tackling this critical issue
Michelle DiPalma
Principal Product Manager - Red Hat
Michelle is a Principal Product Manager for Red Hat’s Trusted Profile Analyzer, part of Red Hat’s Trusted Software Supply Chain. She brings 15 years of experience designing, implementing and administering a wide range of Unix systems solutions for the financial industry. Having extensive experience working on and with security teams gives her a unique perspective on pain points developers, platform engineers and architects, and security teams face regularly. Currently, she is focused on bringing insight and innovation to Red Hat products in the software supply chain space. Michelle holds a Bachelor of Engineering in Computer Science and Physics from Stony Brook University and a Data Science certification from the University of Waterloo.
Mike Foster
StackRox Community Lead - StackRox
Michael Foster is the Community Lead for the open source StackRox project and Principal Product Marketing Manager for Red Hat based in Toronto. In addition to his open source project responsibilities, he utilizes his applied Kubernetes and container experience with Red Hat Advanced Cluster Security to help organizations secure their Kubernetes environments. With StackRox, Michael hopes organizations can leverage the open source project in their Kubernetes environments and join the open source community through stackrox.io. Outside of work, Michael enjoys staying active, skiing, and tinkering with his various mechanical projects at home. He holds a B.S. in Chemical Engineering from Northeastern University and CKAD, CKA, and CKS certifications.
Mitch Ashley
CTO, Techstrong Group Principal - Techstrong Research
Mitchell Ashley is a renowned strategist and technology executive. Mitchell has led successful IT, SaaS, and cybersecurity transformations. He’s led multiple teams in developing and bringing to market successful online services, cybersecurity, and networking products and services. Mitch serves as Principal of Techstrong Research where he leads a team of preeminent experts in digital transformation, DevOps, cloud-native, and cybersecurity. In this role, Mitch works with companies to align digital transformation and technology strategies to achieve disruptive goals and high impact results. Mitch is in high demand as a speaker at conferences the world over, and his popular DevOps Chats podcast engaging with digital leaders is one of the most widely followed in the field.

Register to Watch Now:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.