Hi [[ session.user.profile.firstName ]]

The Role of Security Champion in DevOps

Organizations need Security Champions to help foster security best practices to ensure a security-supportive culture. During this webinar the CSA/SAFECode DevSecOps Working Group wants to share how to build a group of security champions and the characteristics they possess.

During the session we will discuss:
- The Definition of a Security Champion
- Why are Security Champions Needed
- How Security Champions help teams in the organization
- How should an organization go about building a SC Program Strategy?

Joins us as we explore Security Champions and all it entails
Recorded Feb 20 2019 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kenneth Peeples, Principal Consultant, Red Hat & John Martin, Security Program Manager, Boeing
Presentation preview: The Role of Security Champion in DevOps

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Build Fast, Secure Well: Automate DevSecOps and Secure Your Cloud May 7 2019 5:00 pm UTC 60 mins
    Vikram Varakantam, Sr. Director of Product at Lacework
    Automation is key aspect of success in cloud adoption, it can help build faster and deliver continuously at scale. However, it can also make managing security a challenge it not planned well. A strong partnership between DevOps and security - focused on baseline safe configurations and hygiene - can lead to faster innovation and better security.

    Join us for a live webinar with Vikram Varakantam, Sr. Director of Product at Lacework on how cloud security and DevOps teams can come together to forge a more unified DevSecOps model, including:
    ● Fitting security INTO your infrastructure, not IN FRONT of it
    ● Visibility into Use of your Cloud accounts: Securing the cornerstone of your cloud security posture
    ● Operational Configuration Baseline: Baseline your cloud configuration and usage, avoid unintended access that causes serious data leaks
    ● Entity configuration: How best to manage the thousands of entities that are ephemeral and can be a potential risk vector if not used appropriately
  • The Role of Security Champion in DevOps Recorded: Feb 20 2019 47 mins
    Kenneth Peeples, Principal Consultant, Red Hat & John Martin, Security Program Manager, Boeing
    Organizations need Security Champions to help foster security best practices to ensure a security-supportive culture. During this webinar the CSA/SAFECode DevSecOps Working Group wants to share how to build a group of security champions and the characteristics they possess.

    During the session we will discuss:
    - The Definition of a Security Champion
    - Why are Security Champions Needed
    - How Security Champions help teams in the organization
    - How should an organization go about building a SC Program Strategy?

    Joins us as we explore Security Champions and all it entails
  • Zero-Trust and Securely Deploying Medical Devices Recorded: Feb 15 2019 55 mins
    Chris Frenz, AVP of Information Security and Infrastructure at Interfaith Medical Center
    The healthcare sector has been routinely described as lax with the implementation and enforcement of information security controls. In recent years this issue has been highlighted by the numerous attacks targeting healthcare facilities and their devices. Because of this many older devices that remain functional but unpatched have become a liability. This risk goes beyond just a breach vector, it can directly impact human life and give new meaning to the term Denial of Service…
    - What if that infusion pump’s dosage was illegitimately changed or the pacemaker programming made malicious?
    - What if Brickerbot took out a surgical robot or a heart monitor at a critical time?

    In this webinar, Chris Frenz, VP of Information Security and Infrastructure at Interfaith Medical Center, will discuss...
    - OWASP Secure Medical Device Deployment Standard v2
    - Methods to securely deploy medical devices
    - Preventing the compromise of medical devices and mitigating the damage
  • IoT Security: Building Security in from the Start Recorded: Oct 11 2018 64 mins
    Madjid Nakhjiri of Samsung, Aaron Guzman of Aon, and Tal Zarfati of VDOO
    Hear from IoT security experts to get your team on the right track. We’ll discuss:
    - Why is it important to start with a secure hardware foundation for IoT products?
    - What hardware and software security features should you look for in a secure platform?
    - How is penetration testing an IoT product different from traditional IT systems?
    - What lessons can be learned from IoT product penetration testing?
    - What role can automated security analysis play in the product security lifecycle?
    - What can a product team do today to get them on the road to security-by-design?
Exploring the latest research from CSA.
Go in depth into CSA's latest research on everything from IoT to containers to blockchain. Webcasts will break down the research, provide use cases, instructions for implementation, and further insights.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Role of Security Champion in DevOps
  • Live at: Feb 20 2019 6:00 pm
  • Presented by: Kenneth Peeples, Principal Consultant, Red Hat & John Martin, Security Program Manager, Boeing
  • From:
Your email has been sent.
or close