DevOps Conference
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

Agile Threat Modeling the DevSecOps Way

Session

Until February 11:
✓ Transformation Day for free
✓ Team discounts
✓ Save up to £330

Register Now

Until February 11:
✓ Transformation Day for free
✓ Team discounts
✓ Save up to £330

Register Now

Until March 4:
✓ Transformation Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save up to €870
Register now
Bis 4. März:
✓ Transformation Day for free
✓ Raspberry Pi oder C64 Mini for free
✓ Bis zu 870€ sparen
Jetzt anmelden
Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Thank you for joining!


Register now
Vielen Dank für Ihre Teilnahme!


Jetzt anmelden
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Infos
Tuesday, December 1 2020
14:45 - 15:30
Room:
Studio 3

If we can build software in a reliable, reproducible and quick way at any time using Pipeline-as-Code and have also automated security scans as part of it, how can we quickly capture the risk landscape of agile projects to ensure we didn’t miss an important thing? Traditionally, this happens in workshops with lots of discussion and model work on the whiteboard with boxes, lines and clouds. It’s just a pity that it often stops then: Instead of a living model, a slowly but surely eroding artifact is created, while the agile project evolves at a faster pace. In order to counteract this process of decay, something has to be done continuously, something like “Threat-Model-as-Code” in the DevSecOps sense. See in this talk the ideas behind this approach: Agile developer-friendly threat modeling right from within the IDE using open-source tools. Models editable in developer IDEs and diffable in Git, which automatically derive risks including graphical diagram and report generation with recommended mitigation actions.

Take me to the full program of Zum vollständigen Programm von London London .

This Session belongs to the Diese Session gehört zum Programm vom LondonLondon, New YorkNew York and  und MunichMünchen program. Take me to the program of . Hier geht es zum Programm von Berlin Berlin .

Take me to the full program of Zum vollständigen Programm von New York New York .

Take me to the full program of Zum vollständigen Programm von Munich München .

This Session belongs to the Diese Session gehört zum Programm vom LondonLondon, New YorkNew York and  und MunichMünchen program. Take me to the program of . Hier geht es zum Programm von Singapore Singapur .

This Session Diese Session belongs to the gehört zum Programm von LondonLondon, New YorkNew York and  und MunichMünchen program. Take me to the current program of . Hier geht es zum aktuellen Programm von London London , Berlin Berlin , New York New York , Munich München or oder Singapore Singapur .

Stay tuned:

Behind the Tracks

 

Kubernetes Ecosystem

Docker, Kubernetes & Co

Microservices & Software Architecture

Maximize development productivity

Continuous Delivery & Automation

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Monitoring, Traceability & Diagnostics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the way towards DevOps

Live Demo #slideless

Showing how technology really works