TRACK
Security and Vulnerability Management
Ubiquitous network access means data and services may find their ways to places developers and security experts don’t expect. The rise of AI-driven vulnerability scans and attacks expands the threat surface. This requires a different approach to data, network, and application security that is tailored for the challenges presented by cloud native deployments. In this track, we’ll explore these approaches and learn best practices from the experts who have defined and implemented them while keeping an eye on solutions to the threats that loom on the horizon.