Sharing of Personal Information with Sponsors In order to facilitate networking and business relationships at the event, you may choose to visit a third partyʼs virtual booth or to access sponsored content. You are never required to visit third party booths or to access sponsored content. When visiting a booth (e.g. by clicking on a third partyʼs logo in the Solutions Showcase or exhibitor directory, and any actions within the booth thereafter including viewing resources), when accessing sponsored sessions in the Sponsor Theater, or by participating in sponsored activities, the third party will receive some of your registration data. This data includes your first name, last name, title, company, address, email, standard demographics questions (i.e. job function, industry), and details about the sponsored content or resources you interacted with. If you choose to interact with a virtual booth or access sponsored content, you are explicitly consenting to receipt and use of such data by the third-party recipients, which will be subject to their own privacy policies.This is an on-demand session and will be available for the duration of the event.Infrastructure as code (IaC) is a cloud-native game-changer. It's modular, reusable, and super shareable, making it easy to get up-and-running fast. Because it's so user-friendly, however, IaC is often subject to security and compliance misconfigurations that can make their way to production resources and workloads.The key to preventing that from happening is adopting policy-as-code and scanning for misconfigurations continuously throughout the development lifecycle.In this technical demo, we'll show how Bridgecrew enables exactly that for Kubernetes manifests, Terraform, CloudFormation, and more. You'll see Bridgecrew's complete codified cloud security suite in action—our IDE extension, pre-commit hooks, version control and CI/CD integrations, and runtime scanning.