SlideShare a Scribd company logo
1 of 145
Download to read offline
GOTO; Amsterdam 2017 @WICKETT
SECURITY IN THE
DELIVERY PIPELINE
JAMES WICKETT
SIGNAL SCIENCES
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
Want the slides?
james@signalsciences.com
GOTO; Amsterdam 2017 @WICKETT
‣ HEAD OF RESEARCH AT SIGNAL
SCIENCES
‣ ORGANIZER OF DEVOPS DAYS
AUSTIN
‣ LYNDA.COM AUTHOR ON DEVOPS
‣ RECOVERING FROM YEARS OF OPS
AND SECURITY
@WICKETT
GOTO; Amsterdam 2017 @WICKETT
‣ SECURITY IS STILL MAKING THE JOURNEY OF
DEVOPS
‣ SECURITY SEES NEW OPPORTUNITIES TO
AUTOMATE AND ADD VALUE
‣ THE DELIVERY PIPELINE EXTENDS FARTHER
THAN WE USUALLY CONSIDER
SUMMARY
GOTO; Amsterdam 2017 @WICKETT
‣ CULTURE AND TOOLING NEED TO ALIGN FOR
US TO MAKE THIS WORK
‣ COVERAGE OF SECURITY TOOLS FOR THREE
PIPELINE AREAS: INHERIT, BUILD AND RUNTIME
‣ ADVICE FOR DEALING WITH THE AUDITORS
AND OTHER BLOCKERS
MORE SUMMARY
GOTO; Amsterdam 2017 @WICKETT
CI/CD JOURNEY
GOTO; Amsterdam 2017 @WICKETT
CI/CD at three companies
GOTO; Amsterdam 2017 @WICKETT
Currently, at Signal
Sciences we do about 15
deploys per day
GOTO; Amsterdam 2017 @WICKETT
Roughly 10,000 deploys in
the last 2.5 yrs
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
CD is how little you can
deploy at a time
GOTO; Amsterdam 2017 @WICKETT
We optimized for cycle
time—the time from code
commit to production
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Gave power to the team to deploy
GOTO; Amsterdam 2017 @WICKETT
Signal Sciences is a
software as a service
company and a security
company
GOTO; Amsterdam 2017 @WICKETT
Security had to be part of
CI/CD and the overall
delivery pipeline
GOTO; Amsterdam 2017 @WICKETT
Before Signal Sciences
GOTO; Amsterdam 2017 @WICKETT
Rugged Software
circa 2010
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
Started Gauntlt
4 years ago
GOTO; Amsterdam 2017 @WICKETT
Security is different
in CI/CD
GOTO; Amsterdam 2017 @WICKETT
SECURITY’S DILEMMA
GOTO; Amsterdam 2017 @WICKETT
Security Epistemology
is difficult to assess
GOTO; Amsterdam 2017 @WICKETT
Early days of the industry
created a binary
approach to security
GOTO; Amsterdam 2017 @WICKETT
Breached or Secure
GOTO; Amsterdam 2017 @WICKETT
This creates a false
dichotomy
GOTO; Amsterdam 2017 @WICKETT
Complexity Reductionism
falsely propagates this
type of thinking
GOTO; Amsterdam 2017 @WICKETT
Breached or secure?
This is not the question
we should ask
GOTO; Amsterdam 2017 @WICKETT
Where can security add
value?
GOTO; Amsterdam 2017 @WICKETT
AN OPINIONATED VIEW
OF HOW WE GOT HERE
GOTO; Amsterdam 2017 @WICKETT
Agile
GOTO; Amsterdam 2017 @WICKETT
Agile attempted to
remove epistemological
gaps in software
development
GOTO; Amsterdam 2017 @WICKETT
Largely it worked and
created a new culture of
rapid delivery and
feedback loops
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
Operations didn’t ride the
first wave of Agile
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Continuation of Agile to Ops
GOTO; Amsterdam 2017 @WICKETT
DEVOPS IS THE APPLICATION OF AGILE
METHODOLOGY TO SYSTEM
ADMINISTRATION
- THE PRACTICE OF CLOUD SYSTEM ADMINISTRATION BOOK
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
DEV : OPS
10 : 1
GOTO; Amsterdam 2017 @WICKETT
CULTURE IS THE MOST
IMPORTANT ASPECT TO DEVOPS
SUCCEEDING IN THE
ENTERPRISE
- PATRICK DEBOIS
GOTO; Amsterdam 2017 @WICKETT
‣ MUTUAL UNDERSTANDING
‣ SHARED LANGUAGE
‣ SHARED VIEWS
‣ COLLABORATIVE TOOLING
4 KEYS TO CULTURE
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
SECURITY WAS LEFT OUT
OF THE STORY
GOTO; Amsterdam 2017 @WICKETT
Why?
GOTO; Amsterdam 2017 @WICKETT
Compliance Driven
Security
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
[Security by risk assessment] introduces
a dangerous fallacy: that structured
inadequacy is almost as good as
adequacy and that underfunded security
efforts plus risk management are about
as good as properly funded security work
GOTO; Amsterdam 2017 @WICKETT
Dev : Ops : Sec
100 : 10 : 1
GOTO; Amsterdam 2017 @WICKETT
Security as the cultural
outlier in an organization
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
“SECURITY PREFERS A SYSTEM POWERED
OFF AND UNPLUGGED”
- DEVELOPER
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
“…THOSE STUPID DEVELOPERS”
- SECURITY PERSON
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
“every aspect of managing WAFs is an ongoing
process. This is the antithesis of set it and forget it
technology. That is the real point of this research.
To maximize value from your WAF you need to go
in with everyone’s eyes open to the effort required
to get and keep the WAF running productively.”
- WHITEPAPER FROM AN UNDISCLOSED WAF VENDOR
GOTO; Amsterdam 2017 @WICKETT
Bottleneck Approach
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
THE AVERAGE TIME TO DELIVER CORPORATE IT PROJECTS
HAS INCREASED FROM ~8.5 MONTHS TO OVER 10
MONTHS IN THE LAST 5 YEARS
Revving up your Corporate RPMs, Fortune Magazine, Feb 1, 2016
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Revving up your Corporate RPMs, Fortune Magazine, Feb 1, 2016
THE GROWTH OF [SECURITY] FUNCTIONS WHICH IS TOO
OFTEN POORLY COORDINATED… [RESULTING IN] A
PROLIFERATION OF NEW TASKS IN THE AREAS OF
COMPLIANCE, PRIVACY AND DATA PROTECTION.
GOTO; Amsterdam 2017 @WICKETT
IT IS 30 TIMES CHEAPER
TO FIX SECURITY DEFECTS
IN DEV VS. PROD
NIST, 2002, The Economic Impacts of Inadequate Infra for Software Testing
GOTO; Amsterdam 2017 @WICKETT
NIST, 2002, The Economic Impacts of Inadequate Infra for Software Testing
GOTO; Amsterdam 2017 @WICKETT
Security is ineffective
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
SECURITY KNOWS IT
MUST CHANGE OR DIE
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Companies are spending a great deal on security,
but we read of massive computer-related attacks.
Clearly something is wrong.
The root of the problem is twofold: we’re
protecting the wrong things, and we’re hurting
productivity in the process.
THINKING SECURITY, STEVEN M. BELLOVIN 2015
GOTO; Amsterdam 2017 @WICKETT
AVERAGE INCIDENT COST
IS $5.4 MILLION IN THE
U.S.
Poneman Institute, 2013, Cost of Data Breach Report
GOTO; Amsterdam 2017 @WICKETT
High performers spend 50 percent less
time remediating security issues than low
performers. By better integrating
information security objectives into daily
work, teams achieve higher levels of IT
performance and build more secure
systems.
2016 State of DevOps Report
GOTO; Amsterdam 2017 @WICKETT
High performing orgs achieve quality
by incorporating security (and security
teams) into the delivery process
2016 State of DevOps Report
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
http://www.youtube.com/watch?v=jQblKuMuS0Y
GOTO; Amsterdam 2017 @WICKETT
A CI/CD PIPELINE
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Pipelines look different for different people
GOTO; Amsterdam 2017 @WICKETT
‣DESIGN
‣BUILD
‣DEPLOY
‣OPERATE
PIPELINE PHASES
GOTO; Amsterdam 2017 @WICKETT
‣DESIGN
‣INHERIT
‣BUILD
‣DEPLOY
‣OPERATE
PIPELINE PHASES
GOTO; Amsterdam 2017 @WICKETT
‣DESIGN
‣INHERIT
‣BUILD
‣DEPLOY
‣OPERATE
WE WILL FOCUS HERE
GOTO; Amsterdam 2017 @WICKETT
‣INHERIT
‣BUILD
‣OPERATE
SECURITY
CONSIDERATIONS
What have I bundled into my
app that leaves me
vulnerable?
Do my build acceptance
tests and integration tests
catch security issues before
release?
Am I being attacked right
now? Is it working?
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
SECURITY IN THE
DELIVERY PIPELINE
GOTO; Amsterdam 2017 @WICKETT
INHERIT
GOTO; Amsterdam 2017 @WICKETT
OpenSSL
GOTO; Amsterdam 2017 @WICKETT
Shellshock
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
OVER 30% OF OFFICIAL IMAGES IN
DOCKER HUB CONTAIN HIGH PRIORITY
SECURITY VULNERABILITIES
https://banyanops.com/blog/analyzing-docker-hub/
GOTO; Amsterdam 2017 @WICKETT
bundler-audit
for ruby
GOTO; Amsterdam 2017 @WICKETT
Lynis
https://cisofy.com/lynis/
GOTO; Amsterdam 2017 @WICKETT
snyk
serverless dep checks
GOTO; Amsterdam 2017 @WICKETT
Docker Bench for Security
script that checks for dozens of common
best-practices around deploying Docker
containers in production
https://dockerbench.com
GOTO; Amsterdam 2017 @WICKETT
Retire.js
http://retirejs.github.io/retire.js/
@webtonull
GOTO; Amsterdam 2017 @WICKETT
Lots more…
GOTO; Amsterdam 2017 @WICKETT
Instrument your CI
system with checks for all
the things you inherit
GOTO; Amsterdam 2017 @WICKETT
Twistlock
Aqua
Sonatype
BlackDuck
GOTO; Amsterdam 2017 @WICKETT
BUILD
GOTO; Amsterdam 2017 @WICKETT
Security is a function of
Quality
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Vulnerable code in all Languages
WhiteHat Security Report (2015)
GOTO; Amsterdam 2017 @WICKETT
Security tools are
intractably noisy and
difficult to use
GOTO; Amsterdam 2017 @WICKETT
A method of collaboration
was needed for devs, ops
and security eng.
GOTO; Amsterdam 2017 @WICKETT
There needed to be a new
language to span the
parties
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
Open source, MIT License
Gauntlt comes with pre-canned steps that
hook security testing tools
Gauntlt does not install tools
Gauntlt wants to be part of the CI/CD pipeline
Be a good citizen of exit status and stdout/
stderr
GOTO; Amsterdam 2017 @WICKETT
gauntlt.org
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
$ gem install gauntlt
# download example attacks from github
# customize the example attacks
# now you can run gauntlt
$ gauntlt
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
@slow @final
Feature: Look for cross site scripting (xss) using arachni
against a URL
Scenario: Using arachni, look for cross site scripting and verify
no issues are found
Given "arachni" is installed
And the following profile:
| name | value |
| url | http://localhost:8008 |
When I launch an "arachni" attack with:
"""
arachni —check=xss* <url>
"""
Then the output should contain "0 issues were detected."
Given
When
Then
What?
GOTO; Amsterdam 2017 @WICKETT
“We have saved millions of
dollars using Gauntlt for the
largest healthcare industry
project.”
- Aaron Rinehart, UnitedHealthCare
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
http://bit.ly/2s8P1Ll
GOTO; Amsterdam 2017 @WICKETT
‣ 8 LABS FOR GAUNTLT
‣ HOW TO USE GAUNTLT FOR NETWORK CHECKS
‣ GAUNTLT FOR XSS, SQLI, OTHER APSES
‣ HANDLING REPORTING
‣ USING ENV VARS
‣ CI SYSTEM SETUP
WORKSHOP INCLUDES:
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
http://bit.ly/2s8P1Ll
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
github.com/gauntlt/gauntlt-demo
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
github.com/gauntlt/gauntlt-starter-kit
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
SOURCE: THE
THREE WAYS OF
DEVOPS, GENE KIM
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
Most teams use Gauntlt
in Docker containers
GOTO; Amsterdam 2017 @WICKETT
https://github.com/
gauntlt/gauntlt-docker
GOTO; Amsterdam 2017 @WICKETT
ZAP
https://github.com/zaproxy/zaproxy
GOTO; Amsterdam 2017 @WICKETT
Static Code Analysis
e.g. Brakeman
GOTO; Amsterdam 2017 @WICKETT
OPERATE
GOTO; Amsterdam 2017 @WICKETT
Configuration
and Runtime
GOTO; Amsterdam 2017 @WICKETT
Configuration
GOTO; Amsterdam 2017 @WICKETT
Chef Inspec
Audit and CIS
benchmarks on machines
GOTO; Amsterdam 2017 @WICKETT
evident.io
Threatstack
AlienVault
GOTO; Amsterdam 2017 @WICKETT
Runtime
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
GOTO; Amsterdam 2017 @WICKETT
Runtime is arguably the
most important place to
instrument
GOTO; Amsterdam 2017 @WICKETT
Are you under attack?
GOTO; Amsterdam 2017 @WICKETT
Where?
GOTO; Amsterdam 2017 @WICKETT
ModSecurity pumped
to ELK
GOTO; Amsterdam 2017 @WICKETT
RASP and NGWAF and
Web Protection Platform
GOTO; Amsterdam 2017 @WICKETT
Signal Sciences
Immunio
Contrast
This one is the best! [n.b. I work here, but it really is]
GOTO; Amsterdam 2017 @WICKETT
‣ ACCOUNT TAKEOVER ATTEMPTS
‣ AREAS OF THE SITE UNDER ATTACK
‣ MOST LIKELY VECTORS OF ATTACK
‣ BUSINESS LOGIC FLOWS
DETECT WHAT MATTERS
GOTO; Amsterdam 2017 @WICKETT
Runtime instrumentation
also helps prioritize
backlog
GOTO; Amsterdam 2017 @WICKETT
Bug Bounties
GOTO; Amsterdam 2017 @WICKETT
HackerOne
BugCrowd
GOTO; Amsterdam 2017 @WICKETT
A SIDE JOURNEY ON
COMPLIANCE
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Separation of Duties Considered Harmful
GOTO; Amsterdam 2017 @WICKETT
Win over the auditors and
lawyers with the DevOps
Audit Defense Toolkit
https://cdn2.hubspot.net/hubfs/228391/Corporate/
DevOps_Audit_Defense_Toolkit_v1.0.pdf
GOTO; Amsterdam 2017 @WICKETT
3 LESSONS LEARNED
ALONG THE JOURNEY
GOTO; Amsterdam 2017 @WICKETT
Security is not a binary
event; embrace feedback
loops
GOTO; Amsterdam 2017 @WICKETT
Attack Driven Defense
beats Compliance Driven
Defense
GOTO; Amsterdam 2017 @WICKETT
Don’t be a blocker, be an
enabler of the business
GOTO; Amsterdam 2017 @WICKETT
‣ SECURITY IS STILL MAKING THE JOURNEY OF
DEVOPS
‣ SECURITY SEES NEW OPPORTUNITIES TO
AUTOMATE AND ADD VALUE
‣ THE DELIVERY PIPELINE EXTENDS FARTHER
THAN WE USUALLY CONSIDER
SUMMARY
GOTO; Amsterdam 2017 @WICKETT
‣ CULTURE AND TOOLING NEED TO ALIGN FOR
US TO MAKE THIS WORK
‣ COVERAGE OF SECURITY TOOLS FOR THREE
PIPELINE AREAS: INHERIT, BUILD AND RUNTIME
‣ ADVICE FOR DEALING WITH THE AUDITORS
AND OTHER BLOCKERS
MORE SUMMARY
GOTO; Amsterdam 2017 @WICKETT
Want the slides?
james@signalsciences.com
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT
Questions?
GOTO; Amsterdam 2017 @WICKETTGOTO; Amsterdam 2017 @WICKETT

More Related Content

What's hot

DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...
DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...
DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...DevSecCon
 
Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...
Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...
Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...Dynatrace
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays
 
10 Steps to Cloud Happiness
10 Steps to Cloud Happiness10 Steps to Cloud Happiness
10 Steps to Cloud HappinessAll Things Open
 
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...Matt Raible
 
Integrating Security into your Development Pipeline
Integrating Security into your Development PipelineIntegrating Security into your Development Pipeline
Integrating Security into your Development PipelineDevOps.com
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramDeborah Schalm
 
The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019James Wickett
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Erkang Zheng
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon
 
Extend DevOps to Your SQL Server Databases
Extend DevOps to Your SQL Server DatabasesExtend DevOps to Your SQL Server Databases
Extend DevOps to Your SQL Server DatabasesRed Gate Software
 
Scale DevSecOps with your Continuous Integration Pipeline
Scale DevSecOps with your Continuous Integration PipelineScale DevSecOps with your Continuous Integration Pipeline
Scale DevSecOps with your Continuous Integration PipelineDevOps.com
 
What's New with NGINX Application Security Solutions
What's New with NGINX Application Security SolutionsWhat's New with NGINX Application Security Solutions
What's New with NGINX Application Security SolutionsNGINX, Inc.
 
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos CloudCsa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos CloudCSA Argentina
 
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and BeyondOffice 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and BeyondPriyanka Aash
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactSBWebinars
 
The Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS LebowskiThe Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS LebowskiQAware GmbH
 
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftDevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftAmazon Web Services
 

What's hot (20)

DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...
DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...
DevSecCon Boston 2018: Automated DevSecOps infrastructure deployment: recipes...
 
Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...
Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...
Smarter Monitoring for Highly Distributed Cloud Foundry Application Environme...
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
10 Steps to Cloud Happiness
10 Steps to Cloud Happiness10 Steps to Cloud Happiness
10 Steps to Cloud Happiness
 
Was ist ein Service Mesh und wie funktioniert es?
Was ist ein Service Mesh und wie funktioniert es?Was ist ein Service Mesh und wie funktioniert es?
Was ist ein Service Mesh und wie funktioniert es?
 
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
Lock That Shit Down! Auth Security Patterns for Apps, APIs, and Infra - Sprin...
 
Integrating Security into your Development Pipeline
Integrating Security into your Development PipelineIntegrating Security into your Development Pipeline
Integrating Security into your Development Pipeline
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
Monitoring the #DevOps way
Monitoring the #DevOps wayMonitoring the #DevOps way
Monitoring the #DevOps way
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for Kubernetes
 
Extend DevOps to Your SQL Server Databases
Extend DevOps to Your SQL Server DatabasesExtend DevOps to Your SQL Server Databases
Extend DevOps to Your SQL Server Databases
 
Scale DevSecOps with your Continuous Integration Pipeline
Scale DevSecOps with your Continuous Integration PipelineScale DevSecOps with your Continuous Integration Pipeline
Scale DevSecOps with your Continuous Integration Pipeline
 
What's New with NGINX Application Security Solutions
What's New with NGINX Application Security SolutionsWhat's New with NGINX Application Security Solutions
What's New with NGINX Application Security Solutions
 
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos CloudCsa summit 2017 - Plataforma de Seguridad para entornos Cloud
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
 
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and BeyondOffice 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High Impact
 
The Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS LebowskiThe Big Cloud Native FaaS Lebowski
The Big Cloud Native FaaS Lebowski
 
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftDevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
 

Similar to Security in the Delivery Pipeline - GOTO Amsterdam 2017

DevSecOps and the New Path Forward
DevSecOps and the New Path ForwardDevSecOps and the New Path Forward
DevSecOps and the New Path ForwardJames Wickett
 
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSecInnotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSecJames Wickett
 
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecAppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecJames Wickett
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentJames Wickett
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentVMware Tanzu
 
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...Capgemini
 
How to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityHow to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityJames Wickett
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecJames Wickett
 
Application Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery WorldApplication Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery WorldJames Wickett
 
IoT digital disruption and new IoT business models
IoT digital disruption and new IoT business modelsIoT digital disruption and new IoT business models
IoT digital disruption and new IoT business modelsIoTAnalytics
 
Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...
Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...
Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...FactoVia
 
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf
 
Tracxn Research - Smart Homes Report, May 2017
Tracxn Research - Smart Homes Report, May 2017Tracxn Research - Smart Homes Report, May 2017
Tracxn Research - Smart Homes Report, May 2017Tracxn
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
New Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityNew Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityJames Wickett
 
CWIN17 Rome / Cultivate your ecosystem with a holistic disgital platform
CWIN17 Rome / Cultivate your ecosystem with a holistic disgital platformCWIN17 Rome / Cultivate your ecosystem with a holistic disgital platform
CWIN17 Rome / Cultivate your ecosystem with a holistic disgital platformCapgemini
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
 
Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018Online Marketing Rockstars
 

Similar to Security in the Delivery Pipeline - GOTO Amsterdam 2017 (20)

DevSecOps and the New Path Forward
DevSecOps and the New Path ForwardDevSecOps and the New Path Forward
DevSecOps and the New Path Forward
 
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSecInnotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
 
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecAppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
CWIN17 Toulouse / How to track parts lifecycle blockchain and iot-a.calvayrac...
 
How to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityHow to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application Security
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSec
 
Application Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery WorldApplication Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery World
 
IoT digital disruption and new IoT business models
IoT digital disruption and new IoT business modelsIoT digital disruption and new IoT business models
IoT digital disruption and new IoT business models
 
Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...
Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...
Global Azure Bootcamp 2016 - Lyon : Iot Project Management, IoT Edge with Rea...
 
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
 
Test - Haridev
Test - HaridevTest - Haridev
Test - Haridev
 
Test 1
Test 1Test 1
Test 1
 
Tracxn Research - Smart Homes Report, May 2017
Tracxn Research - Smart Homes Report, May 2017Tracxn Research - Smart Homes Report, May 2017
Tracxn Research - Smart Homes Report, May 2017
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
New Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityNew Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application Security
 
CWIN17 Rome / Cultivate your ecosystem with a holistic disgital platform
CWIN17 Rome / Cultivate your ecosystem with a holistic disgital platformCWIN17 Rome / Cultivate your ecosystem with a holistic disgital platform
CWIN17 Rome / Cultivate your ecosystem with a holistic disgital platform
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018Online Marketing Rockstars - State of the German Internet 2018
Online Marketing Rockstars - State of the German Internet 2018
 

More from James Wickett

A Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREA Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREJames Wickett
 
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREA Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREJames Wickett
 
The Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the WorldThe Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the WorldJames Wickett
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline SecurityJames Wickett
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessJames Wickett
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleJames Wickett
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsJames Wickett
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsJames Wickett
 
DevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneDevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneJames Wickett
 
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpJames Wickett
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019James Wickett
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOpJames Wickett
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS LaneJames Wickett
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsJames Wickett
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldJames Wickett
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
The State of DevSecOps in 2018
The State of DevSecOps in 2018The State of DevSecOps in 2018
The State of DevSecOps in 2018James Wickett
 
DevSecOps in the Year 2018
DevSecOps in the Year 2018DevSecOps in the Year 2018
DevSecOps in the Year 2018James Wickett
 

More from James Wickett (20)

A Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREA Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SRE
 
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREA Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASURE
 
The Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the WorldThe Security, DevOps, and Chaos Playbook to Change the World
The Security, DevOps, and Chaos Playbook to Change the World
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and People
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
 
DevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneDevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS Lane
 
The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOp
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOp
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS Lane
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The State of DevSecOps in 2018
The State of DevSecOps in 2018The State of DevSecOps in 2018
The State of DevSecOps in 2018
 
DevSecOps in the Year 2018
DevSecOps in the Year 2018DevSecOps in the Year 2018
DevSecOps in the Year 2018
 

Recently uploaded

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 

Recently uploaded (20)

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 

Security in the Delivery Pipeline - GOTO Amsterdam 2017