<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Secure Your App Modernization Journey

Webinar

Think About Your Audience Before Choosing a Webinar Title


Sponsored by RED HAT marketplace


Tuesday, July 20, 2021
3 p.m. ET

The rapid growth in adoption of cloud-native approaches to modernize applications based on microservice architectures that leverage serverless and container technologies continue to pose unique security challenges that current solutions fail to address. Visibility into user activities, secure controls, constantly changing attack surfaces, monitoring and troubleshooting DevOps, SRE and run-time apps and systems is an ongoing challenge.

In this session, Charles Kolodgy, Analyst with Accelerated Strategies and Girish Bhat, VP, Sumo Logic will offer insights on:

  • Integrating security throughout the DevOps life cycle
  • Modern security solutions for modern apps
  • How to get started with secure app modernization, monitoring and operations
Girish Bhat
VP of Security, CI & Platform Marketing - Sumo Logic
Girish has held leadership roles in Management Consulting, Strategic Planning, Product Management, Competitive and Market Intel, Product Marketing and Marketing at several startups (successful and failed) and brands such as Splunk, Cisco, MobileIron, NetScout. He has been fortunate to have managed numerous Cloud, Analytics, Monitoring, Security, mobile, ML, virtualization, networking and Open Source solutions across the entire product, GTM and customer lifecycle.
Charles Kolodgy
Analyst - Accelerated Strategies Group
Charles J. Kolodgy is a security strategist, visionary, forecaster, historian, educator, and advisor who has been involved in the cyber security field for over 25 years. He is an Analyst with Accelerated Strategies Group and Principal at Security Mindsets. His views and understanding of information and computer security were shaped during his years at the National Security Agency. During that time he held a variety of analyst and managerial positions within both the information assurance and operations directorates. Following NSA is was a a Research Vice President covering security markets for IDC and then a Senior Security Strategist for IBM Security. Over the years he has identified market trends and authored numerous documents to explain market realities and has been a speaker at many security conferences and events, including the RSA Conference, CIO Conference, CEIG, and IANS. He has been widely quoted in the media. He is best known for naming and defining the Unified Threat Management (UTM) market which continues to be one of the strongest cyber security markets with vendor revenue of $3 billion per year. He has been a leading analyst on software security, encryption, and the human element.

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.