Overview
Syllabus
Intro
Summary
CICD Journey
Continuous Delivery
Push to Time
Rugged Software
Gauntlet Project
Agile
Presentation of Velocity
Presentation of DevOps
Ratio of developers to operations
Culture
Moon
ComplianceDriven Security
Security Challenges
Security vs Compliance
Security vs DevOps
Security company flyer
Securitys ineffective
Security is expensive
SEI CD Pipeline
Security in the Delivery Pipeline
Other Security Tools
RetireJS
Vulnerabilities
Security Tools
Gauntlet Call
Gauntlet Code
Garland
Workshop
Labs
Feedback loops
Docker containers
Zette attack proxy
Breakman
Chef
Cloud Providers
Run Time
Am I under attack
Detect what matters
Bug bounties
Bug bounty sites
Separation of duties
We are not people
Three lessons
Attackdriven defense
Recap
Taught by
GOTO Conferences