Apply funnel techniques to understanding adversaries
7
How do we understand adversaries?
8
Data provides a pane of glass
9
There are different levels of adversaries
10
Categorizing and Classifying Tactics
11
Converting to Human/DevOps
12
Continuous Security Testing
13
Assists with getting ahead and staying ahead
14
Unifying security with DevOps...
15
Security Hierarchy of Needs at RSA
16
Full Stack Attack at RSA
17
DevSecOps Lessons at OWASP
18
Get Involved and Join the Community
Description:
Explore DevSecOps transformation strategies in this 21-minute conference talk from USENIX Enigma 2018. Learn how global teams are scaling security out of necessity, discover common pitfalls to avoid, and gain insights into simple techniques for a smoother transition. Delve into topics such as the DevSecOps Maturity Model, understanding adversaries through data analysis, continuous security testing, and unifying security with DevOps practices. Gain valuable knowledge on categorizing tactics, applying funnel techniques, and implementing a security hierarchy of needs. Discover how to stay ahead of threats and join the DevSecOps community to further enhance your skills in creating safer software sooner.
Hats Off to DevSecOps - Shannon Lietz - USENIX Enigma - 2018