Cloud-native transition initiatives and application modernization programs encompass a diverse array of strategies and approaches. Each strategy introduces its unique technology stack, ecosystem, and, inevitably, security considerations.
In this enlightening session, I will delve into an exploration of the most prevalent application modernization strategies. My focus will be on understanding how these strategies dynamically reshape and broaden the attack surface. This transformation underscores the critical necessity of establishing a robust security architecture and deploying appropriate tooling. By dissecting these strategies, their impact on security, and the countermeasures needed, I aim to provide attendees with an understanding of safeguarding modernized applications in an ever-evolving digital landscape.