<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Finding the Hidden Risks in Your Software Containers


Think About Your Audience Before Choosing a Webinar Title

Sponsored by RED HAT 

Thursday, July 8, 2021
1 p.m. ET
Software applications today include components from many sources, including open source, commercial components, and proprietary code. As software supply chain attacks have increased recently--including Codecov, Solar Winds, and others--organizations must embed security and compliance checks in every step of their software development process.
In this webinar, you will learn how to secure your software supply chain for containerized applications, including:
  • Understanding possible attack points in the software supply chain
  • How containers introduce risk the software supply chain
  • The secrets, malware, and configuration risks that could be hiding in your software containers--and what do about it
  • Best practices for securing containers at every stage of the process
Cameron Skidmore
Global ISV Partner Solution Architect - Red Hat
Cameron Skidmore is a Global ISV Partner Solution Architect. He has experience in enterprise networking, communications, and infrastructure design. He started his career in Cisco networking, later moving into cloud infrastructure technology. He now works as the Ecosystem Solution Architect for the Infrastructure and Automation team at Red Hat.
Paul Novarese
Senior Engineer - Anchore
Paul has been working in open source software for over 20 years, providing technical support, training, and general consulting, with a specialization in containers and cloud computing for over six years.

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.