Event | Time | Location |
---|---|---|
Show introducing all talks and sponsors |
|
|
Keynote: Making Software Bill of Materials (SBOMs) Actionable Ciara Carey Developer Relations at Cloudsmith |
|
|
Keynote: Sustainable API Management Akshata Sawant Developer Advocate at MuleSoft |
|
|
Keynote: Say Goodbye to Manual Kubernetes User Access Onboarding Kenneth DuMez Developer Relations Engineer at Teleport |
|
|
Keynote: Oops, there's somebody in my package manager! Thomas Chauchefoin Vulnerability Researcher at SonarSource |
|
|
Keynote: It’s a log eat log world. Crucial Log Management Skills for DevSecOps Arfan Sharif Lead Technical Marketing Engineer at CrowdStrike |
|
|
Keynote: Implementing True DevSecOps with People, Processes, and Technologies Stefania Chaplin Solutions Architect at GitLab |
|
|
Chris Webber Engineering Director, IT and Operations at Open Raven |
|
|
All 46 talks available on demand Pick and choose what order to watch things in |
|
Subscribe |
Software supply chain attacks using software vulnerabilities remain a key avenue of initial access for attackers Organizations had to scramble to find out if critical vulnerabilities like Log4J were running on their systems. In response, Software Bill of Materials or SBOMs are being quickly adopted by enterprises around the globe, so what are they all about? The Linux Foundation research team...
Are you a developer or an architect who’s curious about managing and securing your API throughout its lifecycle? In that case, we’re excited to help!! With an increase in the number of APIs, it complexities associated with managing the APIs increase proportionally. We need a sustainable solution to manage our entire API lifecycle efficiently. We can achieve this with the help of MuleSoft’s...
This talk will focus on the challenges with configuring access control for Kubernetes clusters and why it’s so important to make Kubernetes access both simple and secure. Any engineer that has worked with Kubernetes before — either as an administrator, user or developer — knows that cluster configuration is a massive iceberg. At the tip of the iceberg, you have “just make it work.” At this...
What is your worst supply chain nightmare, and why is it somebody breaking into the backend of a popular package manager? Let's explore how we got our hands on the servers behind the PHP package managers Composer and PEAR, and how we should rethink our approach to supply chain security.
The coupling of security operations and software delivery offers a wonderful use case for logs — both to unify developers and security engineers behind a single source of truth, and to surface possible security issues at every stage of the development lifecycle. Learn how centralized log management is crucial in DevSecOps during this instructive session from a technical engineer.
True DevSecOps requires a healthy mix of People, Process and Technology. What is the business impact of this and how can we use it to drive competitive advantage? First we must look internally, changing culture and breaking down silos. Then, look at the interactions, processes and technologies throughout our software development lifecycle. Security must shift left and be integrated throughout....
Public buckets, missing encryption, databases open to the internet, and an endless stream of misconfiguration tickets all keep us awake at night. How can we put an end to this? The answer lies in knowing where your data is located, what types you have, and how that data is protected. These insights make it easier for us to know what's a priority and what can be put on the backlog. Chris Webber,...
Learn for free, join the best tech learning community for a price of a pumpkin latte.
Event notifications, weekly newsletter
Delayed access to all content
Immediate access to Keynotes & Panels
Access to Circle community platform
Immediate access to all content
Courses, quizes & certificates
Community chats