Sponsored By
Sysdig Polling Questions
Result 1 out of 6
Please let us know your name, company, and email below
1.Paul Davis Wells Fargo Paul.Davis3@wellsfargo.com
2.Keith Stocks, Union Bank, keith.stocks@unionbank.com
3.Robert Renken, Sally Beauty Holdings, 8007775706
4.Arjun Nagarasan AT&T arjuncn@gmail.com
5.Radhika Murudeshwar, United Health Group. radhika_murudeshwar@optum.com
6.Bryan Hunter Bryan.hunter@siemens.com Siemens
7.Rohit Sethi Bank of America Rohit2.sethi@bofa.com
8.Amy Czuchlewski, n/a, amysoot@yahoo.com
9.Robert Renken, Sally Beauty Holdings, Rrenken@sallybeauty.com
10.Alka Siddiqui , Raytheon Technologies, Alka.siddiqui@rtx.com
11.William Varma VP - Transformation Office EDC
12.Tanweer Surve, Wells Fargo, Tanweer.Surve@wellsfargo.com
13.Richard Zhu, MHSAS, Richard.zhu@tn.gov
14.Chris Taskey, RPS, taskeyc@rps205.com
15.Pavan Attur Hudson Regional Hospital Pattur@hudsonregionalhospital.com
16.Kent Zhou | IT Security & Compliance Manager, IT Operations Office: 469-661-2710 Fax: 972-943-5805 Main Event Entertainment 5445 Legacy Drive, Suite 400 Plano, TX 75024
17.James Binford, Humana, jbinford@humana.com
18.Shan Chinnathambi Global Payments Inc shan.chinnathambi@globalpay.com
19.Marsha Johnson City of Birmingham Marsha.Johnson @birminghamal.gov
20.Ajet Ibraimoski, PBS Systems Inc. ajeti@pbssystems.com
21.Marlin Todd Signify Health mtodd@signifyhealth.com
22.Jyoti Patel, SUNY, jpatel@eoc.suny.edu
23.Dave Mutchnik, DaVita, dave.mutchnik@davita.com
24.Warren Turino Tufts Medicine Wturino@melrosewakefiekd.org
Read More
Result 2 out of 6
What are your top 3 concerns when thinking about cloud security?
1. Threats at runtime, Excessive Permissions, Software Vulnerabilities
52%
2. Software Vulnerabilities, Misconfigurations, Compliance
21%
3. Threats at runtime, Misconfigurations, Compliance
13%
4. Excessive Permissions, Misconfigurations, Threats at runtime
13%
Result 3 out of 6
How is your organization ensuring security does not slow down software releases?
1. We embed vulnerability scanning in CI/CD tool chain
54%
2. We scan images in the registry for vulnerabilities
8%
3. We warn developers if software configurations are out of compliance with policies, but don’t block the release
12%
4. We check software configurations in the CI/CD pipeline and block risky configurations
25%
Result 4 out of 6
What is your main concern when it comes to application security?
1. Runtime Security
16%
2. Misconfigurations
20%
3. Misconfigurations
8%
4. Critical Vulnerabilities
54%
Result 5 out of 6
What types of cloud security are you implementing in your organization?
1. Infrastructure as code security
26%
2. Real-time detection of misconfigurations and threats
47%
3. Runtime threat detection and response for containers
4%
4. Managing regulatory compliance
21%
Result 6 out of 6
Would you like to follow up or receive the slides/presentation from Sysdig?
1. Yes please
29%
2. No, thank you
70%