Will Your Application Be Secure Enough When Robots Produce Code for You?

Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
  1. Moscone South

We learned that adversaries are fast on identifying any vulnerabilities to exploit. App building today is based on continuations of everything including auto code generation. As organizations rush to modernize their existing software factories, adversaries will increasingly see the underlying software and infrastructure as high-leverage targets in which to find and exploit such vulnerabilities.

Learning Objectives:
1: Learn how to protect software factories.
2: Find out how to maintain deployment automation by addressing vulnerabilities
3: Learn how to trust but verify with DevSecOps.

SDLC, DevOps and Ci/CD.

Download pdf
  • Hasan Yasar