Posted on
in Presentations
We learned that adversaries are fast on identifying any vulnerabilities to exploit. App building today is based on continuations of everything including auto code generation. As organizations rush to modernize their existing software factories, adversaries will increasingly see the underlying software and infrastructure as high-leverage targets in which to find and exploit such vulnerabilities.
Learning Objectives:
1: Learn how to protect software factories.
2: Find out how to maintain deployment automation by addressing vulnerabilities
3: Learn how to trust but verify with DevSecOps.
Pre-Requisites:
SDLC, DevOps and Ci/CD.
Learning Objectives:
1: Learn how to protect software factories.
2: Find out how to maintain deployment automation by addressing vulnerabilities
3: Learn how to trust but verify with DevSecOps.
Pre-Requisites:
SDLC, DevOps and Ci/CD.
Participants
Hasan Yasar
Participant
Technical Director, SSD Division at Software Engineering Institute, Carnegie Mellon University
Share With Your Community