Security in the Delivery Pipeline

Security in the Delivery Pipeline

GOTO Conferences via YouTube Direct link

Ratio of developers to operations

11 of 47

11 of 47

Ratio of developers to operations

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Security in the Delivery Pipeline

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Summary
  3. 3 CICD Journey
  4. 4 Continuous Delivery
  5. 5 Push to Time
  6. 6 Rugged Software
  7. 7 Gauntlet Project
  8. 8 Agile
  9. 9 Presentation of Velocity
  10. 10 Presentation of DevOps
  11. 11 Ratio of developers to operations
  12. 12 Culture
  13. 13 Moon
  14. 14 ComplianceDriven Security
  15. 15 Security Challenges
  16. 16 Security vs Compliance
  17. 17 Security vs DevOps
  18. 18 Security company flyer
  19. 19 Securitys ineffective
  20. 20 Security is expensive
  21. 21 SEI CD Pipeline
  22. 22 Security in the Delivery Pipeline
  23. 23 Other Security Tools
  24. 24 RetireJS
  25. 25 Vulnerabilities
  26. 26 Security Tools
  27. 27 Gauntlet Call
  28. 28 Gauntlet Code
  29. 29 Garland
  30. 30 Workshop
  31. 31 Labs
  32. 32 Feedback loops
  33. 33 Docker containers
  34. 34 Zette attack proxy
  35. 35 Breakman
  36. 36 Chef
  37. 37 Cloud Providers
  38. 38 Run Time
  39. 39 Am I under attack
  40. 40 Detect what matters
  41. 41 Bug bounties
  42. 42 Bug bounty sites
  43. 43 Separation of duties
  44. 44 We are not people
  45. 45 Three lessons
  46. 46 Attackdriven defense
  47. 47 Recap

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.