DevOps Conference
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

Welcome & opening of the day // Keynote: Agile Threat Modeling the DevSecOps Way

Keynote
Until conference starts
✓ Team discount
✓ Extra specials for freelancers
Register now
Bis Konferenzbeginn
✓ Kollegenrabatt
✓ Extra Specials für Freelancer
Jetzt anmelden
Until July 21:
✓ Save up to $517
✓ Amazon Echo Dot or Arduino for free
✓ Team discount
Register now
Until July 21:
✓ Save up to $517
✓ Amazon Echo Dot or Arduino for free
✓ Team discount
Register now
Until August 11:
✓ Save up to $593
✓ Workshop Day for free
✓ Team discount
Register now
Until August 11:
✓ Save up to $593
✓ Workshop Day for free
✓ Team discount
Register now
Until August 25
✓ Transformation Day for free
✓ Save up to 867€
✓ Amazon Echo Dot or Arduino for free
Register now
Bis 25. August
✓ Transformation Day gratis
✓ Sparen Sie bis zu 867 €
✓ Amazon Echo Dot oder Arduino gratis
Jetzt anmelden
Until conference starts:
✓ Team discount
✓ Specials for freelancers
Register now
Until conference starts:
✓ Team discount
✓ Specials for freelancers
Register now
Infos

We start with a welcome and introduction of the day by Sebastian Meyen, the conference chair.

Followed by Christian Schneider’s keynote:

If we can build software in a reliable, reproducible and quick way at any time using Pipeline-as-Code and have also automated security scans as part of it, how can we quickly capture the risk landscape of agile projects to ensure we didn’t miss anything important? Traditionally, this happens in workshops with lots of discussion and model work on the whiteboard with boxes, lines, and clouds. It’s just a pity that it often stops there: Instead of a living model, a slowly but surely eroding artifact is created, while the agile project evolves at a faster pace. In order to counteract this process of decay, something has to be done continuously, something like “Threat-Model-as-Code” in the DevSecOps sense. See in this talk the ideas behind this approach: Agile developer-friendly threat modeling right from within the IDE using open-source tools. Models editable in developer IDEs and diffable in Git, which automatically derive risks including graphical diagrams and report generation with recommended mitigation actions.

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von Berlin Berlin .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von New York New York .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von Singapore Singapur .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von Munich München .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von London London .

This Session Diese Session originates from the archive of stammt aus dem Archiv von BerlinBerlin . Take me to the current program of . Hier geht es zum aktuellen Programm von Berlin Berlin , New York New York , Singapore Singapur , Munich München or oder London London .

Stay tuned:

Behind the Tracks

 

Kubernetes Ecosystem

Docker, Kubernetes & Co

Microservices & Software Architecture

Maximize development productivity

Continuous Delivery & Automation

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Monitoring, Traceability & Diagnostics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the road to DevOps

Live Demo #slideless

Showing how technology really works