Overview
Syllabus
Intro
What the heck is happening?
How hard could it be?
DevSecOps Maturity Model & Behaviors
Adversary Interest?
Apply funnel techniques to understanding adversaries
How do we understand adversaries?
Data provides a pane of glass
There are different levels of adversaries
Categorizing and Classifying Tactics
Converting to Human/DevOps
Continuous Security Testing
Assists with getting ahead and staying ahead
Unifying security with DevOps...
Security Hierarchy of Needs at RSA
Full Stack Attack at RSA
DevSecOps Lessons at OWASP
Get Involved and Join the Community
Taught by
USENIX Enigma Conference