InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How to Build a DevOps Supply Chain on Zero-Trust Principles

Presented by

ESG Sr. Analyst, Melinda Marks; Check Point Security Engineer Lead, Bisham Kishnani & Developer Security Lead, Dotan Nahum

About this talk

Over the past decade, the concept of Zero Trust has become a fundamental part of cybersecurity architecture. In fact, the concept of Zero Trust is behind most common network security policies, which require continuous and explicit validation, use least privilege access controls, and assume that a breach could have already occurred and we are simply not yet aware of it. Zero Trust has been fundamental in securing enterprise networks from cyber attackers. However, in recent years, cyber attackers are turning their attention away from network based attacks to finding code based vulnerabilities. In this talk series we will discuss how Zero Trust principles, applied so effectively to enterprise network security, can also be applied to continuously protecting the Software Development Lifecycle from would-be attackers. Session Topics Include: "Walking the Line: GitOps and Shift Left Security" with Melinda Marks, Sr. Analyst at ESG "Building a DevOps Supply Chain on Zero Trust Principles" with Bisham Kishnani, Head of Cloud Security Engineering at Check Point Software Technologies "Practitioners Discussion on Developer First Security" with Dotan Nahum, Head of Developer Security at Check Point Software Technologies
Check Point Software

Check Point Software

58771 subscribers421 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics