SH#FT Happens!! How To Deploy DevSecOps principles In The Development Lifecycle

Logo
Presented by

Joylynn Kirui | Senior Cloud Security Advocate (Microsoft)

About this talk

With every commitment, the threat landscape increases. One single vulnerability is all a hacker needs. Vulnerabilities have multiple sources, and you must have a plan for securing each potential risk vector and identify vulnerabilities early. The later they are identified, the more expensive and dangerous remediation is. In this WiCyS strategic partner webinar with Microsoft, Senior Cloud Security Advocate Joylynn Kirui will cover how you can shift security left, practical code scanning, secret scanning, and dependency review. Joylynn will also show you how to connect your repositories to Microsoft Defender for Cloud and leverage Cloud Security Posture Management (CSPM) and Defender for DevOps.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (165)
Subscribers (30290)
Addressing diversity and talent shortages in cybersecurity through recruiting, retaining and advancing women in the field of cybersecurity, and improving on the very low 20-24% statistic of women in cybersecurity jobs.