DevOps Conference
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

Have You Tried Securing the Universe on Orion’s Belt?

Session

Until conference starts:
✓ Team discounts
✓ All inclusive 4-Day Passes available

Register Now

Until conference starts:
✓ Team discounts
✓ All inclusive 4-Day Passes available

Register Now

Until May 20:
✓ Save up to € 268
✓ Team discount
✓ Specials for freelancers
Register now
Bis 20. Mai:
✓ Bis zu 268 € sparen
✓ Kollegenrabatt
✓ Specials for freelancers
Jetzt anmelden
Until June 17:
✓ Transformation Day for free
✓ Save up to $500
✓ Group discount
Register now
Until June 17:
✓ Transformation Day for free
✓ Save up to $500
✓ Group discount
Register now
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Thank you for joining!


Register now
Vielen Dank für Ihre Teilnahme!


Jetzt anmelden
Infos

The move to break up traditional monolithic systems and adopt microservices in cloud-native architectures like Kubernetes and OpenShift ushers in a brand-new security mandate for DevOps teams. Except, well, maybe it doesn’t. Where once it made sense to deploy a traditional firewall to protect an environment’s perimeter from external threats, the rise of container-based microservices necessitates also defending micro-perimeters within the containerized environment. Doing so calls for a new security model congruent with how containerized applications are developed, deployed, and run in production, in order to implement effective safeguards across the critical build-ship-run lifecycle. Plus, cat references! DevOpsCon attendees will learn:

  • Why the new hotness of infrastructure-as-code compromised age-old assumptions about underlying security. 
  • When to trust your “what’s old is new again” feeling in your gut. Yes, maybe you’ve seen this before.
  • How true peace can be attained among Security, Ops and Dev teams. No, really. Pizza for all!
  • The place where vulnerability scanning fits in but, more importantly, where it falls short.
  • It’s too late to stop the ever-morphing data center that is growing inside your data center. The winner of the shadow-IT wars might not be who your thought it was.

This Session originates from the archive of Diese Session stammt aus dem Archiv von New YorkNew York . Take me to the program of . Hier geht es zum aktuellen Programm von London London .

This Session originates from the archive of Diese Session stammt aus dem Archiv von New YorkNew York . Take me to the program of . Hier geht es zum aktuellen Programm von Berlin Berlin .

This Session originates from the archive of Diese Session stammt aus dem Archiv von New YorkNew York . Take me to the program of . Hier geht es zum aktuellen Programm von New York New York .

This Session originates from the archive of Diese Session stammt aus dem Archiv von New YorkNew York . Take me to the program of . Hier geht es zum aktuellen Programm von Singapore Singapur .

This Session originates from the archive of Diese Session stammt aus dem Archiv von New YorkNew York . Take me to the program of . Hier geht es zum aktuellen Programm von Munich München .

This Session Diese Session originates from the archive of stammt aus dem Archiv von New YorkNew York . Take me to the current program of . Hier geht es zum aktuellen Programm von London London , Berlin Berlin , New York New York , Singapore Singapur or oder Munich München .

Stay tuned:

Behind the Tracks

 

Kubernetes Ecosystem

Docker, Kubernetes & Co

Microservices & Software Architecture

Maximize development productivity

Continuous Delivery & Automation

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Monitoring, Traceability & Diagnostics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the road to DevOps

Live Demo #slideless

Showing how technology really works