DevOps Conference
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

Agile Threat Modeling the DevSecOps Way

Session

EARLY BIRD
Until July 9:
✓ Team discounts
✓ Save £239

Register Now

EARLY BIRD
Until July 9:
✓ Team discounts
✓ Save £239

Register Now

Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Until August 13:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to 520 €
Register now
Bis 13. August:
✓ Raspberry Pi oder C64 Mini for free
✓ Bis zu 520 € sparen
Jetzt anmelden
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Until Conference Starts:
✓ Group Discount
✓ Individual offers for
Freelancers and employees of scientific institutions

Register now
Bis Konferenzbeginn
✓ Kollegenrabatt

✓ Sonderkonditionen für Freelancer und
Mitarbeiter von wissenschaftlichen Einrichtungen

✓ Bis zu 375 € sparen
Jetzt anmelden

If we can build software in a reliable, reproducible and quick way at any time using Pipeline-as-Code and have also automated security scans as part of it, how can we quickly capture the risk landscape of agile projects to ensure we didn’t miss an important thing? Traditionally, this happens in workshops with lots of discussion and model work on the whiteboard with boxes, lines and clouds. It’s just a pity that it often stops then: Instead of a living model, a slowly but surely eroding artifact is created, while the agile project evolves at a faster pace.

In order to counteract this process of decay, something has to be done continuously, something like “Threat-Model-as-Code” in the DevSecOps sense. See in this talk the ideas behind this approach: Agile developer-friendly threat modeling right from within the IDE using open-source tools. Models editable in developer IDEs and diffable in Git, which automatically derive risks including graphical diagram and report generation with recommended mitigation actions.

This Session belongs to the Diese Session gehört zum Programm vom New YorkNew York and  und BerlinBerlin program. Take me to the program of . Hier geht es zum Programm von London London .

Take me to the full program of Zum vollständigen Programm von New York New York .

Take me to the full program of Zum vollständigen Programm von Berlin Berlin .

This Session belongs to the Diese Session gehört zum Programm vom New YorkNew York and  und BerlinBerlin program. Take me to the program of . Hier geht es zum Programm von Singapore Singapur .

This Session belongs to the Diese Session gehört zum Programm vom New YorkNew York and  und BerlinBerlin program. Take me to the program of . Hier geht es zum Programm von Munich München .

This Session Diese Session belongs to the gehört zum Programm von New YorkNew York and  und BerlinBerlin program. Take me to the current program of . Hier geht es zum aktuellen Programm von London London , New York New York , Berlin Berlin , Singapore Singapur or oder Munich München .

Stay tuned:

Behind the Tracks

 

Kubernetes Ecosystem

Docker, Kubernetes & Co

Microservices & Software Architecture

Maximize development productivity

Continuous Delivery & Automation

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Monitoring, Traceability & Diagnostics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the way towards DevOps

Live Demo #slideless

Showing how technology really works