Conference Presentations

STAREAST Security Partners or Security Police?
Slideshow

It’s often said that with great power comes great responsibility. As technology becomes more powerful, security becomes a great responsibility. 

Janna Loeffler
STAREAST Visual Regression Testing: A Critical Part of a Mobile Testing Strategy
Slideshow

There are many types of testing that companies need to perform in order to have confidence in their product: security testing, integration testing, system testing, performance testing, and more. 

Dmitry Vinnik
Padlock on a fence 4 Keys to Protecting Your Data in a DevOps World

It may seem like the desires for end-to-end DevOps and protection of sensitive data are in conflict, but if done correctly, they can be two sides of the same coin. DevOps processes such as version control and delivery automation introduce the very measures needed to properly protect production data. The key to keeping data safe while using it during your DevOps process is to focus on these four areas.

Tom Austin's picture Tom Austin
Gene Gotimer Understanding the Role of QA in DevOps: An Interview with Gene Gotimer
Video

Gene Gotimer, senior architect at Coveros Inc., discusses understanding the role of QA in DevOps, DevOps educational tools, trusting your team, and paid and open source security tools.

Jennifer Bonine's picture Jennifer Bonine
Agile DevOps East Serverless Security: Overcome Architectural Security Challenges
Slideshow

Serverless architectures take the idea of microservices to the extreme. To implement secure serverless architectures, you have to understand how to compartmentalize programs at the function level. You also need to factor in security practices: Serverless architectures are susceptible to traditional attacks such as SQL injection and command injection, along with a wide variety of privilege escalation and sensitive data disclosure attacks. Developers must consider what would happen if an attacker attempted to invoke each of their functions directly. What if one of those functions were to become nonresponsive? Designing, implementing, and maintaining serverless architectures dramatically increases the complexity of security. Join Eric Sheridan as he discusses how to implement distributed, secure identity management and entitlement enforcement across 250+ functions.

Eric Sheridan
Agile DevOps East DevSecOps in the Age of Containers
Slideshow

As IT shops look to move their workloads into containers and the cloud, their initial concerns often center around the security implications. Containers do force us to change how we think about securing our application, but they also offer exciting new opportunities. Curtis Yanko will explore the security concerns that come along with containers and take a deep dive into container composability and how modern tooling makes it possible to automate security and compliance concerns across the entire application stack. Curtis will share a project via GitHub that has a reference Jenkins pipeline demonstrating how to automate security and compliance at build time. You will take home ideas for minimizing attack surface, avoiding known bad libraries and frameworks, validating your configuration, and using machine learning to model application behavior.

Curtis Yanko
STARCANADA Combatting Threats to Payment Processing in the Era of Connected Ecosystems
Slideshow

In an increasingly connected world, protection from security vulnerabilities and threats is essential. Yet providing that protection can be complex to understand, especially with changes in digital technology, consumer demands, and how social media influences consumer shopping and payment...

Elizabeth Koumpan
Mike Faulise Giving Control Back to Software Developers: An Interview with Mike Faulise
Video

In this interview, Michael Faulise, the founder and managing partner at tap|QA, explains how the move toward DevOps and away from release management is giving control back to developers, then details why major companies often need partners to leverage CI, CD, and other modern techniques.

Jennifer Bonine's picture Jennifer Bonine
Jeff Payne Why You Need to Take Security and DevOps Seriously: An Interview with Jeff Payne
Video

In this interview, Jeff Payne, the CEO and cofounder of Coveros, explains why major companies just aren’t that good at security. He discusses how you can better protect your business, as well as why DevOps can and should be a key to your success.

Jennifer Bonine's picture Jennifer Bonine
DevOps West 2018, Agile Dev West 2018, Better Software West 2018 A Definition of Done for DevSecOps
Slideshow

[video:https://youtu.be/oQE8ysEvzaQ width:300 height:200 align:right]

Gene Gotimer

Pages

AgileConnection is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.