DevSecCon 2017 Feb. 23, 2017 to Feb. 23, 2017, singapore,singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Security is shifting left Shannon Lietz Security has mostly operated towards the right of implementation just prior to deployment. With the ...
CD and Segregation of Duties (SoD) Sriram Narayanan CD and Segregation of Duties (SoD): Discuss how to work with SoD while frequently releasing ...
Extending and securing Chat-Ops Arun Narayanaswamy Showcasing chat tools extensions with Hubot. How to make chat and ops work well with ...
Integrating crowdsourced security into agile SDLC Ante Gulam In an ideal world, security involvement should start early in the Agile process and should ...
AppSec DevOps automation – real world cases Ofer Maor Everybody wants to create the perfect AppSec test automation as part of DevOps. Transparently identifying ...
Securing the container DevOps pipeline William Henry Adoption of container technology has surged due to the standardisation and usability resulting from the ...
Building an application vulnerability toolchain for DevSecOps Abhay Bhargav One of the key challenges for application security in DevOps, is that scaling vulnerability assessment, ...
Using open source automation tools for DevSecOps Joel Divekar Automation tools are key for managing DevOps and DevSecOps: In this talk we'll focus on ...
A trip through the security of DevOps tools Guillaume Dedrie Nowadays, security has become a very hot issue. With the DevOps philosophy spreading everywhere and ...
From resilient to antifragile – chaos engineering primer Sergiu Bodiu Monkeys, Lemurs & Locusts Oh “We bought a Zoo” - Is the idea of a ...
DevSecOps in the government Fabian Lim Singapore is known to be efficient and so is the government. As Singapore's software engineers ...
Testing IOT application endpoints Jason Kent As we all connect everything in our homes to the Internet, we need to seriously ...
Using adversarial modelling in driving secure application development Pishu Mahtani Use cases are helpful for eliciting, communicating and documenting requirements. Additionally, use cases are also ...
Automated infrastructure security monitoring and defence Madhu Akula , Akash Mahajan Monitoring for application attacks and defending them in real-time is crucial. Crunch through all the ...
Developing a high-performance security focussed Agile Team Kim Carter Quality (security included) does not have to be neglected when you're planning, building and running ...