Learn From the Best Minds in Tech
Over a thousand on-demand webinars, roundtables, and virtual events covering the technologies reshaping your world. All free. All from practitioners who’ve been there.
Latest Events
View all events
CI/CD: Delivering Software at Enterprise Velocity

Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale

Your AI Agents Already Have Too Much Access, Now What?

Test Smarter, Not Slower: AI-Driven Functional Testing
Browse by Topic
20 specialized tracks covering every corner of modern technology
Artificial Intelligence
Agentic AI, LLM Security, GenAI & moreCybersecurity
AppSec, Cloud Security, Zero Trust & moreDevOps & CI/CD
GitOps, Terraform, Pipelines & moreCloud & Infrastructure
AWS, Kubernetes, Hybrid Cloud & moreObservability & AIOps
Monitoring, SRE, Incident Response & morePlatform Engineering
Developer Platforms, Internal Portals & moreCompliance & Risk
Open Source Risk, FinOps, DORA & moreApplication Security
DAST, SAST, Supply Chain & moreOn-Demand Library
A curated preview of on-demand sessions. Filter by topic, then reveal more when you need a deeper browse.

CI/CD: Delivering Software at Enterprise Velocity

Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale

Your AI Agents Already Have Too Much Access, Now What?

Test Smarter, Not Slower: AI-Driven Functional Testing

From Prompt to Exploit: How LLMs Are Changing API Attacks

The new attack surface of Agentic AI coding

Stress‑Testing AWS Infrastructure with Terraform: A Hands‑On Technical Challenge

IaC Isn’t Enough for Database Delivery

Stress‑Testing AWS Infrastructure with Terraform: A Hands‑On Technical Challenge

Data is the Differentiator for Exposure Management

The Context Engine: Why Consolidation is the Natural Future of AppSec

Operationalizing Risk-Based Vulnerability Management

Operationalizing Risk-Based Vulnerability Prioritization in Modern AppSec Programs

Hands-On Incident Investigation with Agentic AI

Workshop: Hands-On Incident Investigation with Agentic AI

Turning Visibility into Control: What DSPM Must Do

AIOps: Turning Intelligence into Trusted Automation

From Alerts to Insights: Zendesk’s Journey to an AI-First Detection Strategy

Breaking the Wall: How CharacterAI Scaled AI Inference to Millions with AMD and DigitalOcean

Experimentation: Your Secret Weapon For Validating AI-Generated Code

Experimentation: Your Secret Weapon For Validating AI-Generated Code

The New Reality of Open Source Risk: 2026 OSSRA Findings

AI + CI/CD + Remote Dev Environments: Reshaping how developers create software

Restoring Trust in Open Source: Strategies for a Secure Supply Chain

Taming AI Code Sprawl With Harness Feature Flag Policies

Agentic AI Pulse: Scaling Toward Reliable Operations

Five Questions Your Cloud Team Can’t Answer in Under Five Minutes

Operationalizing AWS Governance at Scale: Five Questions Your Team Can’t Answer in Under Five Minutes

The 2026 IT Investment Benchmark: Navigating Sovereignty, AI, and Resilience

Fewer Incidents, Measurable ROI: A New Standard for IT Change Governance

Run and Scale Agentic AI Applications in Production

Arm at the Center of the Agentic AI Data Center Revolution

AI’s Real Impact: From Developer Tools to Organizational Outcomes

The compliance paradox: Move fast, stay compliant

Analyze Terraform using Agentic GenAI workflows

From DevOps to AI-Powered DevSecOps: Building the Modern Platform Engineering Stack

AI Writes Your Code: Who Owns What Happens Next?

Bare Metal at AI Speed

Closing the Cloud Security Gap With Runtime Protection

The Context Engine: Why Consolidation is the Natural Future of AppSec

Next-Gen DSPM for the AI-Driven Enterprise

Cloud Security Maturity Best Practices for 2026

Why Traditional Security Fails the FinServ Speed Test

Spill the Beans: What’s Really Brewing in Campus & Branch Networks

Why Argo CD Breaks at Scale (and How to Avoid It)

Tag, You’re It: The Backbone of FinOps

Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale

Securing the Future of AI-Native Development: Trusting the Code You Didn’t Write

The Future of Agentic Software Delivery Across Source & Binaries

Everything you Need to Know About the Cyber Resilience Act

The AI Code Wave: How to Use Intelligent Quality Gates to Prevent Reviewer Burnout

AI’s Next Chapter: RISC-V and Custom Silicon

Your “Pager” Is Lying to You: Fixing On-Call, Alerts, and MTTR for Real

The Prescriptive Path to AI Security: From Chaos to Scalable Governance

Beyond Hyperscalers: Why AI Builders are Choosing Crusoe

A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each

Agentic AI vs. Identity’s Last Mile Problem

Protect Your SDLC From Risky And Malicious Third Party Components

From Click to Compromise: Stopping Business Email Compromise at the Human and Identity Layer

From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic

Building for Velocity: Accelerating Adoption with Internal Developer Platforms

From Reliable to Self-Optimizing: An AIOps Roadmap for Data Center Networking

Modernizing Mainframes: From Monolithic Code to Modular Architecture

Autonomous IT: Transforming Operations and Security in Real Time with AI

Agentic AI vs. Identity’s Last Mile Problem

The Five Most Dangerous New Attack Techniques…and What to Do for Each

Making Software Delivery Resilient with Autonomous Recovery

Solving Virtualization Dilemmas with Dell, Red Hat and Intel

The Compliance Paradox: Why More Rules Mean Faster Releases

The Brass Ring of AppSec: Is AI Finally Making DAST to SAST Correlation Possible?

Can AI Lift Organizations Above the Cyber Poverty Line?

The Performance-Cost Tradeoff in Cloud Databases

Governance, Security, and Compliance in Agentic Solutions – Building Trust in AI-Powered Automation: Governance and Compliance with Power Platform

Break Free From Jenkins: A Blueprint for Modernization

Conversational Interfaces and Intelligent Apps – Apps Meet Chat: Building Engaging Experiences with Power Platform

Agentic Automation: The Future of Workflows – Beyond Automation: Designing Multi-Agent Systems for Enterprise Scale

State of Cloud Security: The Speed of AI, The Consolidation of Defense, and The Future of the SOC

Innovate with Low Code + AI Agents: From Idea to Impact: Accelerating Innovation with Low Code and AI

DORA in Action: How Financial Institutions Are Adapting and Thriving

From “Noise” to Nuke: How to Hunt, Track, and Trash Ransomware Attackers Early

Secure AI Everywhere: From Edge to Container

Safeguarding Data & Compliance on Next-Gen iOS Devices

Securing AI Velocity: Making Enterprise DevOps Modern and Efficient with Harness and AWS

Inside the Audit: Achieving Continuous Readiness

DevOps 101 Series: Building Efficient CI/CD Pipelines

De-Risk, Optimize, and Scale Generative & Agentic AI with Unified Observability

Getting on the same page: Agentic AI software testing strategies and fixing the disconnect between executives and teams

Rethinking Data for AI: From Chaos to Concurrency

The Next Evolution of Application Security: AI-Accelerated DevSecOps

From Firefighting to Foresight: How AI Is Redefining SRE & DevOps

Burning Down the Backlog: Reducing Risk with AI

Stop the Unknown Unknowns – A Maturity Model for AI Red Teaming

Cut Risk, Control Costs, Drive Modernization: VMware-to-AWS Migrations with LogicMonitor

You’re not overspending, you’re under-saving

Double Your Ransoms, Not Your Costs: Scaling Your Gang with AI

Prioritizing Digital Executive Protection to Manage Corporate Risk

Your platform’s gatekeeper problem: Why shared responsibility beats control

Zero Trust for Autonomous Agents: Extending Identity-First Access Control

5 Best Practices to Achieve Top-Tier Cloud-Native Scale

How Cloud-Native Artifact Management facilitates DevOps Modernization and Platform Engineering

From rollouts to results: unlocking the value of Feature Management and Experimentation

How Experts Accelerate Delivery and Eliminate Test Environment Challenges

Doubling Down on Security: JFrog and GitHub Deliver Unified Code and Binary Advanced Security

Designing and Defending AI Agents: A Practical Guide

Cut Cost and Complexity: Smarter VMware Migrations to AWS powered by LTIMindtree

The Regulation and Liability of Open Source Software

Aqua Security Resources

Big Risks, Engineering Bottlenecks, and AI

Big Risks, Engineering Bottlenecks, and AI

Kong & AWS Immersion Day: Kong Konnect and AI Gateway

How Can Security Move Faster Than Vulnerabilities?

Analyze Terraform using Agentic GenAI workflows

Is Your DevOps Stack Slowing You Down?

5 Key Ways to get your AI Applications Ready for Production

AI-Embedded ERP for Lean Teams

Improving AWS Cloud Management Through StackGen AI Agents

Seamless VM Migration and modernization with AWS and Red Hat

Migrate and Modernize: A Practical Path to Cloud Transformation with Nutanix

Scaling GitOps: Making IaC Enterprise-Ready with OpenTofu

The Road to AITrustOps: Preparing Financial Institutions for AI-Driven Software Threat

Engineering Intelligence in the Age of AI: From Data to Actionable Insights

Accelerate & Secure: Optimizing Your Software Supply Chain with DevSecOps

Engineering Intelligence in the Age of AI: From Data to Actionable Insights

Beyond the Breach: Protecting Revenue, Reputation, and Innovation with Cortex Cloud and Unit 42

DevSecOps: Cracking the Code – LLM Poisoning: The Research, The Results

5 Best Practices to Achieve Top-Tier Cloud-Native Scale

From Terraform Chaos to Enterprise Scale: How Platform Teams Enable Organization-Wide IaC Without Breaking Developer Velocity

How to Scale Terraform with AI Agents for 10x Developer Velocity

Securing the Cloud: Cybersecurity in AWS

Building for Scale: Benchmarking and Performance Tuning of AI Cluster Networks

Kubernetes in the Enterprise: Best Practices and Real-World Applications

Live Hack: Exploiting AI-Generated Code

Secure Every Stage of Your SDLC: From Code to Artifact Delivery

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code

Deploying AI on-prem? Now secure it!

DevOps 101: Modern Package and Artifact Management

DevOps 101: Modern Package and Artifact Management

DevOps 101: Modern Package and Artifact Management

Mastering Cloud Cost Optimization: Real-World Strategies with Harness

Software Safety and Security in the AI-Driven Era

Secure Vibe Coding: Real-Time AI Guardrails with Semgrep MCP

DevSecOps: Cracking the Code – The Agentic AI Imperative for Cloud-Native AppSec

AI Is Writing the Code – Can Security Keep Up?

Doubling Down on Security: JFrog and GitHub Deliver Unified Code and Binary Advanced Security

Tickets Bad! Self-Service Good! Build Developer Infrastructure Portals That Scale

The Evolution of Developer Portals

AI Infrastructure Is Not One-Size-Fits-All and Why That Matters

On-Prem AI Inference and Model Training Made Easy: Fast Setup, Simple-to-Use, and Fits Your Budget

The CPU is the Heart of AI Infrastructure

Drive Productivity and Growth through Enterprise Service Management

Securing Cloud Secrets at Scale Vault & AWS Best Practices

Scaling Hybrid AI: How to get started with the top Agentic AI Use Cases

Strengthen AWS Infrastructure Security with Sentinel in Terraform

Tech Field Day Insider Webinar — AI, Hyperscale & Mission-Critical: The Next Chapter in Enterprise Storage

Where AI Security Really Happens: Inside the Container

Secure Hybrid AI: How to Responsibly use AI

Three Game-Changing Cloud-Native AI Use Cases You Can Implement Now

How to Spot and Stop Security Risks From Unmanaged AI Tools

Cost-efficient cloud infrastructures for AI workloads

Lenovo’s Hybrid AI Factory & Platforms: Strategy and Introduction to Lenovo AI

Accelerating Enterprise DevOps: Governance, Velocity, and Real-World Impact

The Unified Pipeline: Database & App CI/CD

Prototype Today, Deploy Tomorrow: Vision at Scale

Why “Shift Left” Failed—And What to Do Instead

Actionable ITSM Strategies to Drive Towards the “Effortless” Experience

Building The Next Generation of Software: Leading The AI Armies

Engineering Safer Systems: How Experimentation Improves Infra Releases

Resilience through Chaos: Integrating IPM into your Observable SDLC (OSDLC)

Beating Bottlenecks – A Revolutionary Solution for Mainframe Delivery

What 1,000+ PlatformCon 2025 submissions tell us

Ensuring Kubernetes Application Resiliency, Security, and Compliance with AWS and Across Your Landscape

Maximize Efficiency & Security for Kubernetes with SUSE Rancher Prime & Amazon EKS

Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

JFrog’s Software Supply Chain State of the Union 2025 Report: Trends, Threats & Actions

Streamlining AWS DevOps with Automation

Measuring CI/CD Platforms with Engineering Insights

Measuring What Matters: A Closer Look at Smartsheet’s Economic Impact

Role of the Developer: From Coder to AI Development Orchestrator

Developer-First Security: How to Automate Security Tests with GitHub, GitLab, and more

The Multicloud Imperative: Oracle and Azure deliver a seamless experience

Need for Speed: Optimizing Build Processes for Maximum Velocity

Optimizing Log Management in Datadog: Cut Costs Without Losing Insights

Is Platform Engineering the Evolution of DevOps—or Its Replacement?

Is DevEx the Same as DevSecOps?

Why are you still using legacy CI tools?

Empower Your Sales with AMD EPYC™ 4005 Processors

Powering SMB Growth with AMD EPYC™ 4005 Processors

AI and Your DevOps Career: Adapting and Thriving in an Evolving Landscape

AI vs. Humans: The Future of Work—Will AI Augment or Replace Your Role?

Reduce Regression Testing from 200 Hours to 40 Without Adding More Work

Empowering Developer Innovation: Balancing Speed, Security, and Scale

AI Red Teaming and the Future of LLM Security

Integrating AI for Scalable and Secure Developer Platforms

The Future of AI Platform Engineering: Integrating AI for Scalable and Secure Developer Platforms
AI and Your DevOps Career: Adapting and Thriving in an Evolving Landscape

Optimizing Hybrid Cloud Resiliency and Security

DevOps Unbound – Emerging Trends and Intelligent Agents

Powering AI Innovation: Secure, Scale, and Govern AI Traffic with Kong AI Gateway and AWS Bedrock

Securing Open Source Software Supply Chains – The Next Frontier of Innovation
How to Seamlessly Deploy Oracle Database Workloads on Google Cloud

The 2025 Guide to Open Source Security and Risk

Software Under Pressure: Master Resilience Testing
Need for Speed: Optimizing Build Processes for Maximum Velocity

Optimizing Cloud Migration: The Smart Move with Microsoft and Dynatrace

Modernizing Security for Kubernetes: Why Legacy Approaches No Longer Apply

From Silos to Synergy: Aligning DevOps and Security Mindsets
Past, Present, and Future: How Innovation Fuels Career Growth

Unlocking Simplicity: Dynatrace Solutions for Log Analytics

API Orchestration: Moving Beyond API Management for Enterprise Transformation

Cloud Native in Minutes, not Days: Empowering Developers through Platform Engineering

From Chaos to Control: Transform Incident Management

Full Content Inspection: The New Standard for Network Security

Laying the groundwork for AI agent development

Modern App Development in the Cloud Era: Balancing Innovation, Efficiency, and Cost

DevSecOps “Friends”, Webinar Series: The one where DevSecOps meets business

The Top 5 Principles for Successful Cloud Security
From Lift-and-Shift to Click-and-Ship: The New Era of Cloud Migrations

Database DevOps: Fast Database Changes with Performance and Compliance

Beyond the Firewall: Ensuring OT App Security

NIST Cybersecurity Framework v2.0 Explained

Improving Resilience for GenAI Workloads on AWS

AI and Machine Learning in Security

Master Kubernetes: Achieve runtime visibility, security, and compliance across your stack

What’s required for modern observability in 2025?

Putting Your Data to Work to Protect your Software Supply Chain

AWS Terraform Solution Series Immersion Day

Who’s Committing Code to your App? Lessons Learned from Real Breaches

DevSecOps “Friends”, Webinar Series: The one where automation gets ship done

DevSecOps “Friends”, Webinar Series: The one where automation gets ship done

Edge AI in Action: What a Sports Analytics Cloud-to-Edge Success Story Teaches Us About the Next Revolution

Revolutionizing Developer Experience: How Platform Engineering Transforms Daily Workflows

Charting an Enhanced Path to Transformation – Cognizant’s Approach to Migrating VMware to AWS Cloud Native Services

How Do We Test AI models and software? Ensuring Quality and Reliability in a New Era of Development

GitOps, OpenTofu and the New World of Infrastructure-as-Code Management

Mastering Team Development: Top 5 Kubernetes Best Practices

Rethinking AppSec: Getting to the Root Cause of Your Business-Critical Vulnerabilities

Step into Practical DevOps with QA Optimization: Streamlining Software Testing in Regulated Industries

AI’s Rise in Development: What BSIMM15 Teaches About Security

Is Your API Gateway Ready for Multicloud?

Simplifying Network Access: Secure Modern Connectivity with Tailscale

Optimizing AKS costs with Azure Spot VMs

DevSecOps “Friends”, Webinar Series: The One with the Governance Glow-Up

Accelerating App Modernization: Balancing Agility, Innovation, and Security

Drive the Success of a Layered API Strategy with GraphQL Federation
Chart a new course: Migrating VMware-based workloads to the cloud with AWS

VMware to Cloud Native Migration Strategies

From Chaos to Clarity: Solving AI Data Pipeline Inefficiencies

Hacker Tactic: Avoid Blind Spots with Your Windows Event Logs

Unlocking the Value of an Internal Developer Portal (IDP): Assessing the Impact on Your Organization
VMware Series: Breaking Free From Broadcom

DORA in Action: How Financial Institutions Are Adapting and Thriving
NIST Cybersecurity Framework v2.0 Explained

Deep Dive: Terraform Stacks

2024 DORA Report – Effective Uses of Platform Engineering and AI in DevOps

Achieving Resilient Systems at Scale: A Roadmap to Proactive and Secure Chaos Engineering

Scaling application security for Generative AI with Snyk and Deloitte
Beyond the Firewall: Ensuring OT App Security

The Culture of Cloud: Navigating the Shift from VMware to AWS for Modern IT Transformation

Security Considerations in the Time of AI: Perspectives from a Builder, a Buyer, and a Founder

Unshackling Productivity Access Control for Modern DevOps in Three Acts

Dec 16 – Dec 20 Weekly Webinars

Deploy GenAI applications with real business value on AWS

Behind the Stream: The Technology That Powers Large-Scale Live-Streaming Experiences

Behind the Stream: The Technology That Powers Large-Scale Live-Streaming Experiences

Simplify Building AI-Native: Embedding Models and Vector Databases

Unlocking the Future: Seamless Migrations to AWS with Insight

DevSecOps “Friends”, Webinar Series: The One with Platform Engineering (and the Happy Developers)

Let the Butler Retire: Modernizing Your CI/CD Beyond Jenkins

Securing Generative AI Workloads on Modern Application Architectures

API Gateways Are More Than Just Traffic Managers

Mastering DevSecOps in 2024: Insights on AI-Driven Security

Modernizing Financial Applications and Securing Cloud Migration with GitLab & AWS

Navigating Compliance: Ensuring Your Software Meets Regulatory Standards

Boss-Level Strategies For Securing Your SDLC
Reduce operations risk and cut costs with modern private cloud

Cracking the Code: The Ingredients for Quality Software, Fast!

A New Era for DevOps: Using AI to Revolutionize the Software Development Lifecycle

Seamlessly Integrating Database Changes into CI/CD with Database DevOps

Boost Developer Productivity: GitHub & JFrog Integration in Action

Accelerating AI in the Enterprise: Staying Ahead While Staying Secure

Harnessing the Power of GenAI and Martech for Customer Trust and Innovation

The Last Great Cloud Transformation: Navigating Data Compliance Challenges in AI-Powered Cloud Transformations
Staying Ahead: Top Internet Trends Shaping Networking and Security

Unlocking Your Core Business Potential With Kubernetes, Without It Being a Distraction

Security’s Confidentiality, Integrity and Availability (CIA) Triad – Outdated or Still Relevant?

Intelligent Code Coverage: Why You Really Don’t Need to Test Everything

Managing Dependencies at Enterprise Scale

From KubeCon to Code: Building Distributed Apps with Kubernetes on Akamai

Securing Your Code: Combating Malware in the Software Supply Chain

Understanding the AI Ecosystem: How to Secure AI-Powered Applications in 2024

Modernizing Financial Services Workloads with GitLab and AWS – Balancing Innovation, Compliance, and Resilience

Build Better, Faster: Accelerate Development with In-Context Analytics

End-to-End DevSecOps: Integrating JFrog and AWS for a Secure Pipeline

AI as Your Cybersecurity Co-Pilot: Outsmarting Real-World Threats in the Cloud

Building Resilience from Architecture to Production With AWS & Gremlin

Connect the Dots: Native Integration of External Applications into Kubernetes

Revolutionizing Functional Test Automation with AI and Codeless Testing

Strengthening Your Organization’s Security Lifecycle Management

The Evolution Of Performance Engineering: Mastering Trends and Tackling Challenges

Why You Need SCA and SBOM

Migrate, Modernize, and Build Applications on AWS With Containers and Serverless

Unleashing Business Value through AI-Powered Data Modernization on AWS & Persistent

The Barriers to Engineering Led Experimentation are Falling

Accelerate FedRAMP Compliance on Amazon EKS with Anchore
Revolutionize AI with HPE Private Cloud AI

The Last Great Cloud Transformation: Mastering Security for Your Hybrid Workforce

10 Things You Hate About Your API Gateway

DevOps Done Right: Best Practices to Accelerate Your Software Delivery

Bring Mobile Observability to DevOps With Embrace and Grafana Labs

Creating a Security Culture: Scaling Your Security Team Outside of Your Security Team

Effortless Cloud Connectivity: Simplifying Networking for EKS Developers

AWS Dynatrace Hands-On Virtual Immersion Workshop: Accelerate Your Cloud Journey With Observability and Modernisation

Don’t Get Distracted: Data Management and Quality Are as Fundamental as Ever

The Transformations Needed to Scale DevSecOps

Elevate Software Quality: Integrating Observability into Your Testing Process

Tailscale: The DevOps VPN – Streamlining Cloud Networking with AWS

Waste-Free EKS Infrastructure: Rightsizing Clusters the Easy Way
Navigating VMware to AWS: The Fastest Path to Success

Terraform (Infrastructure as Code) and Why It Needs Better Management

AppSec for the Win: Proven Best Practices that Work

The API Gateway Advantage: Streamlining Security, Performance, and Scalability

How Visa Cross-Border Solutions Reduces Outages by Testing System Resilience in Their SDLC

The AI Efficiency Edge: Empowering Your Teams with Okta & Amazon Q

How Test Data Drives the Quality of Software Release

Leading Software Development in Microservices and Containers Era: Embracing Microservices and Containers


Scaling Enterprise Data Science Through AI-Based Automation

New Hiring Strategies In The Competitive Market for Digital Talent

Beyond 2024: Preparing Your Device Fleet for What’s Next

The Last Great Cloud Transformation — Strengthening Security Through Consolidation

Secure Guardrail Fundamentals: How to Empower Devs to Help!

Unified Security: Connecting Executives and Engineers in Cloud DevSecOps

Case of the Common Vulnerability? Secure Guardrails Can Help!

Ensuring the AppSec and API Security Strategy Meets the Moment

Unified Security: Connecting Executives and Engineers in Cloud DevSecOps

Observability in a Serverless World

Modernizing Digital Banking Services: Harnessing Cloud Technology

Predicting Business Outcomes with Enterprise Time Series Data

Empowering Security Champions: Optimizing for Security Excellence

Platform Engineering: Building the Future of Digital Transformation

Optimizing and Securing Cloud Workloads: Insights and Innovation with Google Cloud

Scaling Serverless Development With Platform Engineering – A Blueprint for Success

Securing Tomorrow’s Code: A Guide for Executive Decision-Makers

Infrastructure from Code in the Product Delivery Lifecycle

Accelerating AI/ML Feature Set Engineering and Deployment

Kubernetes Optimization Strategies

Dynatrace and the Power of Possible

Infrastructure As Code (IaC) – Transforming Development, Test, and DevOps

AWS Serverless and GenAI Experience

Modernization is Essential to Prepare for the Adoption of Generative AI
Navigating Enterprise Transformation: Cisco’s Digital Adoption Journey

Revolutionizing DevOps With The Power of AI

The Radical Future of Application and API Security Testing

Building Serverless Applications on AWS With HashiCorp Terraform

Accelerate your GCP Migration Journey

DevSecOps

Applying a Data Engineering Approach to Telemetry Data

Making Observability Affordable: Smart Strategies for Cost Reduction

Opportunities, Pitfalls, and Mishaps: Financial Implications for Tech Company Growth

Building Data Products With Embedded Analytics

GraphQL for the Enterprise: Scaling with GraphQL Federation

Adopting a DevOps Culture for Cloud Migration Success

Cloud and Self-Hosted CI/CD Performance

Platform Engineering For Cloud Migration and Modernization Success

Addressing the Security Challenges of Operational Technology

How to Build Resilience Throughout Your SDLC: Lessons from a Top-10 Bank

From Legacy to Leading-Edge: Modernizing Windows Workloads

Implementing Security Best Practices for Serverless Applications

Implementing Security Best Practices for Serverless Applications

Strategies for Success: Developing a Comprehensive Cloud Vulnerability Management Program

Unlock IoT Potential with Device Gateways

Proactive Container Security: Prioritizing Vulnerabilities with Reachability

Using Release Delivery Metrics to Drive Better Performance

On the Brink: Why AppSec Leaders are Burning Out (and How to Stop It)

On the Brink: Why AppSec Leaders are Burning Out (and How to Stop It)

The Balancing Act: Mastering the Art of Cost-Efficient Cloud Performance for Engineers

Accelerate Application Modernization: Faster, Smarter Deployments on AWS

AKS Optimization Workshop: Running Optimally Balanced Infrastructure at Scale

How Many Types of SBOM Are There?

Infrastructure as Code in Platform Engineering

How to Drive Revenue and Optimize Operations With GenAI Analytics

Large-Scale Data Processing with Serverless on AWS

Accelerating Application Modernization on AWS with the AveriSource Platform

Learn How to Monitor Your Generative AI Tech Stack with Datadog

Is Platform Engineering the New DevOps?

A Realist Approach to Least Privilege in Cloud

Choosing the Right DevOps Toolchain – Something Customizable or All-in-one?

Infrastructure From Code: Solving IaC Challenges

Unlock Operational Excellence with AWS and GitLab: Your Path to Continuous Customer Value Innovation

AI and DevOps: How AI Trailblazes a New Path for Automated Testing

Beyond Microservices: Leveraging Containers for all Modern Applications

Cloud and Generative AI Implications on DevSecOps

Remove the Burden of Non-Functional Requirements for Your Apps and APIs with ngrok

5 Time-Saving Hacks to Find 500 Hours. Same Cloud. More Control. More Time.

AI Model Mastery: Ruling Governance Like a Pro with the Mighty Frog

Operationalizing AI in DevOps Workflow

AWS DeepRacer: Get Hands-on With AI

Got DevOps? DevOps, Platform Engineering and SRE: The Dynamic Trio

Got DevOps? Mastering Observability Across Development, Testing and Security

Improving Customer Support With Generative AI-Powered Assistants

Secure Guardrails in Software Development

Database DevOps: Automate, Collaborate, Deliver and Win

Accelerate Mobile App Delivery With Confidence

Hottest Trends in Platform Engineering

Mastering AI Security Posture Management for Cloud Security Professionals

Modernizing GitOps: From Infrastructure to Apps

Got DevOps? Delivering Continuous Value with CI/CD, Today and Tomorrow

Fast-Tracking Generative AI: Building Permission-Aware Applications

Getting to Grips With Gitness: Your New Open Source Code Hosting and Pipeline Engine

Unlocking Observability: Understanding Google Kubernetes Engine With Datadog

Workshop: Using AI to Improve Operational Efficiency

Past, Present and Future: The Evolution of CI/CD

Achieving Control Over the Ever-Changing Multi-IAC Stack

Ship Safer Apps Faster With nGrok and Linkerd

How Are You Protecting Your Company from API Security Breaches?

Accelerate AI Innovation: Unlocking the Power of Generative AI With LaunchDarkly and Amazon Bedrock

Don’t Expect Developers to be Security Experts!

Container Management

Building Resilience in the Cloud With the AWS Well-Architected Framework and Gremlin

Transforming Developer Productivity in an API-Dependent Environment

Securing Modern Application Development: The CISOs’ and Security Team’s Perspective

The 2024 Guide to Open Source Security and Risk

Workshop: Optimizing Kubernetes in the Cloud the Smart Way

Embracing Efficiency: Monitoring Generative AI Applications on Azure AKS

Unlock Developer Productivity & Operational Simplicity with Serverless

How to Achieve Agility With Stability

Talkin’ Ship Virtual Workshop: Faster, Risk-Free Deployments

Government Takedown of Ransomware Rings – What CISOs Need To Know

Implementing Governance for Chaos Experiments

What AI Doesn’t Know About Kubernetes in Production

Unlocking the Power of Enterprise Security Data

Risk and Threat Management Strategies in an Evolving Digital World

DevOps Trends in the Age of Generative AI

The Rise of Platform Engineering

Solving Cloud-Native Complexity With AIOps for Observability

An Inside Look at How Portworx by Pure Storage Built an IDP

Shifting Left to DevSecOps With NGINX

There’s No Easy Button for Managing Kubernetes and the Cloud

How Combining SAST and SCA Strengthens Security

How Cloudcraft Helps You Visualize Infrastructure and Collaborate With Cloud Architects

Accelerating Dev/Test Cycles for Kubernetes Apps With ngrok and Rancher

Modernize Your VM Strategy From On-Premises to the Cloud

Why I Love DevOps – From Tools to Teams

Coding is Enjoyable, but the Rest is Still Toil! How can Generative AI Help?

Transformative Benefits of Automated Dependency Updates for Your Applications

Ignoring Developer Experience is Hurting Your Organization: DX is Critical

Ensuring Secure, Scaleable Ingress to Customer Networks With ngrok

Ensuring Secure, Scaleable Ingress to Customer Networks With ngrok

Top Trends That Will Shape Data on Kubernetes in 2024

Another Webinar to DevOps

Scale and Standardize Your infrastructure in Azure, With Red Hat Enterprise Linux

How to Bring DevSecOps to V-Shaped Development

Building Resilient Organizations Around IT and Cybersecurity

How to Apply DevSecOps Practices in the Multi-Cloud Era

CI/CD Security Anti-Patterns and Antidotes

Generative AI: “Why and How” for Telcos

Optimizing Your Cloud Strategy: Achieving Flexibility, Longevity and ROI

Cloud-Native Testing, Containers and Microservices

Unraveling Threats in the Cloud: Leveraging Telemetry for Effective Detection in Google Cloud Platform

Best DevSecOps Practices for Maintaining Cloud Security

Data Management for Containers and VMs in Red Hat OpenShift

Protecting Your Software Supply Chain From Code to Cloud on AWS

Beyond the SBOM: Understand and Mitigate Your Attack Surface

Secure CI/CD Software Delivery Without Sacrificing Speed and Convenience

Building and Breaking Vulnerable APIs

Cloud Security – DevSecOps (APAC)

AWS Immersion Day: Using Observability To Unlock Cloud Insights With AWS And Datadog

AWS Immersion Day: AIOps With PagerDuty And AWS

AppSec 101: Complete Application Security Across the SDLC

Turbocharge Database Performance with Caching

How to Shift Left the Right Way

A Developer’s Journey: Architecting a Winning DevOps Strategy Using CI/CD for Automation at Scale

Building Trust in Digital Identity Verifications: Account Enrollment and Beyond

Operationalizing DevSecOps

Identity and Access Management

Harnessing Next-Gen Identity Security Solutions for Today’s Threat Landscape
DevSecOps

Two Birds, One Stone: Shrinking Security Debt and Attack Surfaces

CISO Panel: Tips for Optimizing a Cloud-Native Security Stack in 2023

Lessons From a Live Hack: Secure Your Cloud From the Inside

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

Digital Business Observability: Analyzing IT and Business Data Together

Where Will DevSecOps ‘Shift’ Next?

The Top Five Cloud Native Development Risks
Kubernetes Benchmark Report 2023 – See How You Compare

Kubernetes Benchmark Report 2023 – See How You Compare

Left, Right and In Between: Thinking API Security

Application Security

Secrets Management and DevSecOps: An Enterprise Maturity Model

Overcoming the Challenges of Deploying a Microservices Data Layer on Kubernetes

App Dev Platforms for Kubernetes

Identity Zero-Trust: From Vision to Practical Implementation

Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts

API Security

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

Finding the Ransomware Threat INSIDE Your Backups

Container/Kubernetes Management

A Framework for GitOps App Recoverability With Red Hat OpenShift and TrilioVault

LIVE WORKSHOP – Fast, Reliable and Secure Access to Private Web Apps

Building a Successful Open Source Program Office

Defending Against Emerging Ransomware Threats

Shift Left Done Right

Powering Innovation and Secure Growth at Speed and Scale

Applying the 2022 OSSRA Findings to Software Supply Chain Risk Management

CloudOps: Achieving Continuously Optimized Cloud Infrastructure

DevOps, Dependencies and SAFe — Unifying Value Streams to Accelerate Delivery

The 7 Dimensions of a Project-to-Product Transformation

Achieve DevOps Success While Closing Skill Gaps

The Hottest Value Stream Metrics (That Actually Matter)

LIVE WORKSHOP – Modernization Workshop With HashiCorp Terraform Cloud

Better Testing With Fewer (Smarter) Tests

Ransomware Investigation: The Complete Demo

Mitigate Risks in Code: Protect Your Software-Based Supply Chain

Improving AppSec With Application Security Posture Management

How Secure Backups and Analytics Can Help You Recover From Ransomware in Hours

Controlling Privacy and the Use of Data Assets

Hackers’ Rights

Monitoring Azure Kubernetes Service on Hybrid Cloud With Datadog

Securing Access to Sensitive Corporate Data and Applications in the Hybrid World

Kubernetes at the Edge

A Discussion of Automated Infrastructure Security with a Practical Example

Building Your Continuous Delivery Pipeline
Upcoming Live Events
Register now — across DevOps.com, Security Boulevard, Cloud Native Now & Platform Engineering

Multi-Million-Dollar Lessons: What FinOps Maturity Actually Looks Like

Analyze Terraform using Agentic GenAI workflows

Securing the Untrusted Agentic Development Layer

AppSec in 2026: Security at Machine Speed — or Not at All

You Can’t Just Layer AI on Your Observability Platform: Why Context is King

Bare Metal at AI Speed

Test Smarter, Not Slower: AI-Driven Functional Testing

AI in DevOps: An Enterprise Reality Check
Beyond Embedded! RISC-V in the Performance CPU segment

The AI Reality Check – Operationalizing for Business Value

From Weeks to Minutes: A Practical Blueprint for Simplified Data Integration and Access

Disconnected tools create disconnected teams.

Observability Comes of Age: Why 2026 Is the Turning Point

From Experimentation to Production: Why Inference Is the Defining Layer of AI

Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale

The Cost of Exposure: Managing the Operational Risks of Executive Security Incidents

CI/CD: Delivering Software at Enterprise Velocity

The Future of Agentic Software Delivery: Unifying Source & Binaries

How to Conduct AI-Native Bug Discovery & Triage

35 Million Lines, Zero Build-Breakers: How Adyen Scaled DevSecOps
Powered by the Techstrong Network
Techstrong Learning is part of the Techstrong Group media network — the tech industry’s premier source for DevOps, cybersecurity, cloud native, AI and digital transformation content. Our learning events draw on the editorial depth and practitioner community of all eight Techstrong properties.
Every event is produced by a team that has executed over 1,000 webinars and virtual events, reaching audiences across 92 countries. Whether it’s a 30-minute lightning session or a full-day virtual summit, you’re learning from the people who are shaping your industry.
Put Your Brand in Front of Tech’s Decision-Makers
Techstrong Learning events aren’t just webinars — they’re full-service campaigns with guaranteed lead generation, thought leadership positioning, and brand visibility across the Techstrong network. We’ve produced over 1,000 events reaching audiences in 92 countries. We handle everything: strategy, messaging, production, promotion, and lead delivery.
Choose Your Format
Custom Webinar
The flagship 60-minute format. Your topic, your speakers, your messaging — produced and promoted by Techstrong across all 8 properties. 200+ guaranteed registrations.
- 200+ guaranteed registrations
- Full production & promotion
- On-demand for 12 months
- Lead list delivered within 5 days
Lightning Session
Today’s tech pros are too busy for hour-long webinars. The Lightning Session is 20-30 minutes of focused insight — combining 80 guaranteed leads with 1,500+ views for lead gen and visibility in one program.
- 80 guaranteed leads
- 1,500+ guaranteed views
- 20–30 minute format
- Completed in weeks, not months
The Two Step
Two buyer touches in perfect sync: custom content (white paper, case study, analyst report) paired with a live learning event. Higher-intent leads through dual engagement touchpoints.
- 2 buyer touch points
- 200+ guaranteed registrations
- Custom content + live event
- Higher-intent lead signals
Virtual Summit
Full-day flagship events — DevOps Experience, Cloud Native Now, AI SRE Summit, Predict. Multi-session, multi-speaker events with keynotes, panels, and sponsor showcases.
- Flagship brand events
- Multiple sponsorship tiers
- Keynote & session opportunities
- Extended on-demand distribution
Analyst-Guided & Roundtables
Futurum Group analysts lead the discussion, bringing third-party credibility to your narrative. Monthly roundtable topics align with market trends across all Techstrong verticals.
- Futurum Group analyst moderation
- Third-party credibility
- Monthly topic calendar
- Multi-sponsor formats available
Intent Signal Report
Go beyond lead lists. A custom-branded analytics report revealing which companies attended, their engagement depth, buying signals, and technology interests. Optional Futurum analyst deep dive.
- Company-level intent data
- Engagement depth scoring
- Custom-branded report
- Optional analyst advisory
A Team, Not a Tool
Most webinar platforms hand you a login and wish you luck. Techstrong Learning gives you a team with deep expertise — not only in producing successful events, but expert knowledge in your industry. We help you pick the right messaging, format, flow, and experience for your audience.
DIY Webinar Platform
Techstrong Learning
Ready to Reach Your Audience?
Tell us about your goals and we’ll recommend the right format, topic, and timeline for your campaign.
Or email sales@techstronggroup.com directly
1,000+ Events. 92 Countries. Your Audience Is Here.
Whether you’re looking to learn or looking to reach the people who are learning — Techstrong Learning is where technology meets its practitioners.