How to Build a DevOps Supply Chain on Zero-Trust Principles

Logo
Presented by

ESG Sr. Analyst, Melinda Marks; Check Point Security Engineer Lead, Bisham Kishnani & Developer Security Lead, Dotan Nahum

About this talk

Over the past decade, the concept of Zero Trust has become a fundamental part of cybersecurity architecture. In fact, the concept of Zero Trust is behind most common network security policies, which require continuous and explicit validation, use least privilege access controls, and assume that a breach could have already occurred and we are simply not yet aware of it. Zero Trust has been fundamental in securing enterprise networks from cyber attackers. However, in recent years, cyber attackers are turning their attention away from network based attacks to finding code based vulnerabilities. In this talk series we will discuss how Zero Trust principles, applied so effectively to enterprise network security, can also be applied to continuously protecting the Software Development Lifecycle from would-be attackers. Session Topics Include: "Walking the Line: GitOps and Shift Left Security" with Melinda Marks, Sr. Analyst at ESG "Building a DevOps Supply Chain on Zero Trust Principles" with Bisham Kishnani, Head of Cloud Security Engineering at Check Point Software Technologies "Practitioners Discussion on Developer First Security" with Dotan Nahum, Head of Developer Security at Check Point Software Technologies
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (347)
Subscribers (52779)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.