What are the DevSecOps Talks?
The DevSecOps talks are a re-occuring series of webinars that bring together experts and practitioners from different backgrounds to discuss the latest best practices, tools, and techniques for implementing DevSecOps in organizations of all sizes.
This series will provide valuable insights and inspiration for all attendees looking to improve their practices in DevSecOps, as well as foster connections and collaboration within the community.
What will you learn from this series?
How to Implement Automated Security Testing Into CI/CD
Security testing is a crucial component in ensuring quality code, but it can be tricky to find the right tools to automate this process. In this talk series, you will learn how to integrate security testing tools into your pipeline, how to monitor and review results, and how to update and refine your testing process as your codebase and security requirements evolve.
How to Leverage Intelligent Code Analysis to Ship Quality and Secure Code Faster
Intelligent code analysis involves automatically reviewing and analyzing source code to identify potential issues, such as security vulnerabilities, bugs, and performance problems. Developers can leverage such code analysis by using it as part of the development workflow. In this series, you will learn how to integrate code analysis tools into your development and continuous integration environments and automatically scan your code for security vulnerabilities and improve quality.
How to Put Ownership of Security Testing Into the Hands of Developers
Developers often report feeling a lack of ownership and autonomy when it comes to ensuring the security and quality of their code. The talks in this series aim to propose workflows that empower developers to take ownership of security testing, and to find and fix issues autonomously.
How to Mitigate the Risks of Open-Source Components
Many companies rely on open-source software components, but this can present unique issues in maintaining a secure product. You will learn how to identify reputable, well maintained components, how to conduct security assessments that include open-source components, and how to manage vulnerabilities.