Resources

On-Demand Webinars & Live Events

Deep technical sessions from the engineers and leaders building enterprise infrastructure at Fortune 500 scale. Watch on your schedule or register for upcoming live events.

SecurityInfrastructureData ArchitectureComplianceEngineeringLeadership

All Webinars

SecurityJanuary 15, 202645 min

Zero-Trust Architecture: From Theory to Production

David Reyes

CISO

A comprehensive walkthrough of migrating a Fortune 500 enterprise from perimeter-based security to a fully operational zero-trust architecture. David covers the three-phase migration framework Novastraxis has refined across 400+ implementations, including identity foundation, microsegmentation rollout, and continuous verification enforcement. Includes real metrics from production deployments and hard lessons learned from the field.

InfrastructureFebruary 3, 202660 min

Migrating 10,000 Workloads Without Downtime

Sarah Okonkwo

COO

Sarah shares the operational playbook behind the largest single-customer migration in Novastraxis history: moving 10,000 production workloads across three cloud providers with zero customer-facing downtime. Covers pre-migration assessment, dependency mapping, traffic shifting strategies, and the real-time monitoring dashboards that kept the team informed throughout the 72-hour cutover window.

Data ArchitectureFebruary 18, 202655 min

Data Mesh at Enterprise Scale

Marcus Chen

CTO

Marcus dives deep into the architectural decisions behind the Novastraxis Data Mesh Engine, which now manages over 14 petabytes of federated enterprise data. This session covers domain boundary design, data contract specification, self-serve infrastructure provisioning, and the governance patterns that enable hundreds of autonomous teams to operate without a centralized data team.

ComplianceNovember 12, 202550 min

FedRAMP High: What It Really Takes

David Reyes

CISO

An unvarnished look at the 18-month journey to FedRAMP High authorization. David shares the documentation burden, the engineering changes required, the 3PAO assessment process, and the ongoing continuous monitoring commitments. This session is designed for security and compliance leaders evaluating FedRAMP authorization for their own platforms, with practical guidance on timeline estimation and resource planning.

SecurityDecember 5, 202545 min

Kubernetes Security in Production

Dr. Anika Patel

VP Engineering

After auditing 1,200+ enterprise Kubernetes deployments, Dr. Patel presents the most common security misconfigurations and how to eliminate them. Covers pod security standards, RBAC gap analysis, supply chain attack prevention with SLSA and Sigstore, runtime anomaly detection, and network policy enforcement. Includes a live demonstration of lateral movement in a misconfigured cluster.

EngineeringJanuary 28, 202640 min

Building Observable Distributed Systems

Kenji Tanaka

VP Platform Engineering

Kenji walks through the observability architecture that monitors the Novastraxis platform across 48 global regions. This session covers structured logging at scale, distributed tracing with OpenTelemetry, metric aggregation pipelines, SLO-based alerting, and the custom correlation engine that reduces alert noise by 94%. Practical guidance for teams building their own observability stacks.

LeadershipMarch 3, 202635 min

The CISO's Guide to Board Reporting

David Reyes

CISO

Security leaders are increasingly expected to present to the board, but most board-level reporting fails to communicate risk in business terms. David shares the reporting framework he has developed over 15 years of board presentations, covering risk quantification, metric selection, threat landscape summaries, and how to translate technical findings into investment decisions that non-technical directors can act on.

SecurityMarch 10, 202650 min

AI-Driven Threat Detection: Behind the ML Pipeline

Dr. Anika Patel

VP Engineering

A deep technical session on the machine learning pipeline that powers the Novastraxis Threat Analytics Engine. Dr. Patel covers feature engineering from raw security events, model architecture choices for anomaly detection, the feedback loop between SOC analysts and model retraining, and how the system processes 14 billion events daily with sub-second inference latency. Includes discussion of false positive reduction strategies and model explainability.

Featured Research

State of Enterprise Security 2026

Our annual analysis based on 14 billion daily security events across 2,400+ enterprise deployments. Understand the threat landscape and the trends shaping security strategy this year.

48-page report1,247 CISOs surveyed

Never Miss a Session

Subscribe to get notified about upcoming live webinars, new on-demand sessions, and exclusive Q&A opportunities with our engineering and security leadership team.

Typically 2 emails per month. Read by 18,000+ engineering leaders. Unsubscribe anytime.