Hi [[ session.user.profile.firstName ]]

DevOps Culture Shift: Expanding On-Call Responsibilities

“I just write the code and throw it over the wall. It’s up to Ops to make it work” -- when Devs care only about coding, Ops and customers suffer.

“It’s not my job to test code. If there’s a problem, talk to QA.” -- when Ops care only about stability, innovation and customers suffer.

DevOps represents cultural change. Whether it’s the change of resistant engineers that don’t want to be on-call or the change of Operations teams to have more empathy towards their counterparts writing code, to the willingness of executives to embrace a culture of automation, measurement and sharing. Organizations must overcome the culture war to be able to approach the agility and productivity that organizations following a DevOps model gain. The faster they can get there, the faster these organizations can take the competitive edge away from traditional enterprises.

In this webinar, featuring guest Forrester Research principal analyst Kurt Bittner, we will look at:
- The current state of organizations - a separation of Devs and Ops
- The how of DevOps - DevOps is a culture, not a product
- The benefits of DevOps - happier customers

As part of our panel discussion, we will answer the following questions to help you get started building a DevOps culture within your organization:
- Why change the status quo?
- How do I align two disparate groups?
- How do I remove the obstacles that separate Dev and Ops teams?
- Will customers see a difference if devs are on call?
- Can IT start to think differently?
Recorded Sep 16 2015 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Todd Vernon, VictorOps Founder & CEO
Presentation preview: DevOps Culture Shift: Expanding On-Call Responsibilities

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Panel Discussion: Proactive Privacy and Security Jun 6 2019 12:00 pm UTC 45 mins
    Tbc
    How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.

    Viewers can learn more about:
    - Effect of GDPR: One year later
    - How are enterprises instituting changes to achieve and maintain compliance
    - Challenges to achieving compliance in an IoT world
    - How to bake privacy and security into your processes
    - Best practices for data protection and privacy from the ground up

    Panellists tbc
  • Panel Discussion - Application Security in a DevOps World Jun 6 2019 9:30 am UTC 45 mins
    tbc
    With today's enterprises leveraging around 1000 applications and multiple clouds, application security is becoming a key area of focus. Application security testing is being integrated into the DevOps process early on, while automation, speed and coverage and becoming critical to the success of DevSecOps programs.

    Join this interactive panel of industry experts to learn more about:
    - Why application security is critical
    - Key principles for building application security into DevOps
    - Best practices for leveraging automation
    - Speed vs Security: Where do you draw the line?
    - Recommendations for improving security in 2019

    Panellists tbc
  • Panel Discussion - Protecting Against Phishing, Ransomware & Social Engineering Jun 5 2019 12:00 pm UTC 45 mins
    tbc
    External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

    Join security experts from the industry to learn more about:
    - The most prevailing cyber threats businesses face in 2019
    - Lessons from cyber attacks and strategies for protecting against them
    - Solutions for faster breach detection and response
    - Why network visibility is key
    - Recommendations for improving enterprise security

    Panellists tbc
  • Panel Discussion: CISO Challenges and How to Solve Them Jun 5 2019 9:30 am UTC 45 mins
    tbc
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists tbc
  • Panel Discussion - Securing the IoT in the Age of Threats Jun 4 2019 12:00 pm UTC 45 mins
    tbc
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists tbc
  • Panel Discussion - Multi-Cloud Security and Compliance Jun 4 2019 9:30 am UTC 45 mins
    tbc
    The cloud strategy of today's enterprise spans across multiple clouds and hundreds of applications. Point security solutions no longer work, so enterprises are turning toward a more orchestrated approach to achieving security and compliance in the cloud.

    Join cloud and security leaders in an interactive discussion to learn about:
    - Key security and compliance challenges associated with a multi-cloud strategy
    - Recommendations for managing and automating security across multiple clouds and applications
    - The future of cloud
    - Improving enterprise security in an ever-changing threat landscape

    panellists tbc
  • Key Steps to Identify Risk and Master Vendor Risk Management Apr 25 2019 5:00 pm UTC 75 mins
    Colin Whittaker with panelists from Bitsight, Lockpath, OneTrust, and ProcessUnity.
    In today’s interconnected technology ecosystem, companies increasingly rely on third party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program. Join this CPE accredited panel webinar as our expert panel address some key steps to master VRM, including:

    - Implementing a scalable VRM program from the ground up
    - Mapping the digital supply chain
    - Tips on managing vendor data
    - Assessing third, fourth, and fifth-party risk
    - Performing quantifiable vendor security analyses
    - Establishing pre-procurement standards
  • Riding New Data Regulation Waves: Intro to CCPA Apr 23 2019 4:00 pm UTC 60 mins
    Victoria McIntosh, Information & Privacy Professional
    Surf's up! Coming into force in 2020 is the California Consumer Privacy Law. As a new privacy law in the United States, the CCPL breaks significant ground. Following international trends, those living in California will soon have stronger privacy rights.

    If you do business in the state or process data on California residents, time to pay attention. Get amped with Privacy Technologist Victoria McIntosh, breaking down what you need to know about the new regulation.
  • Implementing a NIST Framework for Adaptive Cybersecurity Mar 21 2019 5:00 pm UTC 75 mins
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, CEO of Lynx Technology Partners.
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Revitalizing Access Control Programs: Intelligent Automation Mar 7 2019 6:00 pm UTC 60 mins
    Colin Whitaker, Informed Risk Decisions; Phil Shomura, Senior Product Manager, ACL
    No organization’s suite of business applications is static, especially for businesses that have committed to non-stop innovation. It is not uncommon for businesses to integrate only their high-impact applications with their existing identity and access management (IAM) systems. This can cause a huge surge in manual work, and oftentimes enterprises dedicate hundreds of human agents to manage accounts, adding more as new business applications are added. Enterprises can sidestep significant costs, increase efficiency, manage risk and deliver undiscovered value, by properly leveraging automation technologies across IAM systems.

    Robotic process automation (RPA) is a powerful technology that harmonizes different systems across an organization’s environment, reduces human errors, provides 24/7 operations, and relieves employees from repetitive tasks so they can focus on more valuable activities. For example, data quality management in the risk and compliance processs has been a traditional pain area for many institutions, as it is very time consuming and manual. However, a cognitive RPA solution which combines machine learning capabilities can enable fast automated remediation of data quality issues, and the system can learn from the final decisions taken by the data analyst as well. Attend this CPE webinar for insights on:

    - Getting started with an access management program.
    - Evaluating the right configuration and system-based tools to automate processes at a task level, and align to your process automation strategy.
    - Leveraging advanced analytics in risk management, compliance, and continuous monitoring programs.
    - Embedding governance, risk management, and controls into your enterprise’s mobilization and deployment of RPA, so you can catch issues before they arise.
  • Critical Actions to Prevent a Data Breach in 2019 and Beyond [Recording] Recorded: Feb 20 2019 76 mins
    Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4
    * This is a recording so CPE credit is unavailable.

    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.
  • Favorite Talks, Topic Trends…The Inside Scoop on RSA Conference 2019 Recorded: Feb 7 2019 46 mins
    Britta Glade, Wendy Nather, Rich Mogull, Diana Kelley, Ryan Berg
    Join RSA Conference Director of Content Curation and four Program Committee Members for a panel discussion about the topics they’re most excited about at RSA Conference 2019. Plus, some hints at the big discussions to take place in areas like Blockchain, security strategy and more:

    * Is Blockchain bulletproof?
    * Are there technical risks related to cryptocurrencies?
    * How to assess the coverage and gaps in your security portfolio
    * The theme of “acceptance” in security strategy
    * Exciting sessions in our Hackers & Threats track from chipset to containers, as well as smart contracts
    * Closing the enterprise gaps when it comes to moving to the cloud

    You’ll have a chance to ask questions during this live webcast. Join us for this exclusive preview of what you’ll hear about at RSA Conference 2019, March 4-8 in San Francisco.

    Britta Glade, Director Content & Curation, RSA Conference
    Wendy Nather, Director, Advisory CISOs, Duo Security
    Rich Mogull, Analyst & CEO, Securosis
    Diana Kelley, Cybersecurity Field CTO, Microsoft
    Ryan Berg, Fellow, Alert Logic
  • Managing Compliance and Security in the Cloud Recorded: Jan 30 2019 43 mins
    Benny Czarny, Tzach Horowitz, Ariel Zeitlin, Diana Kelley
    "In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

    Join cloud, security and compliance experts as they discuss:
    - How to proactively analyze security risk from the business perspective
    - What you need to know about your data, and how to ensure it is compliant when in the cloud
    - How to automate security policy changes
    - Top challenges for CISOs and CIOs
    - Achieving security and compliance across multiple clouds
    - Steps to take today"

    Presenters
    Benny Czarny, CEO and Founder, OPSWAT
    Tzach Horowitz, Pre-Sale Director, Cybergym
    Ariel Zeitlin, CTO and co-founder, Guardicore
    Diana Kelley, Cybersecurity Field CTO, Microsoft
  • Strategies for Cyber Resilience in 2019 Recorded: Jan 30 2019 50 mins
    Aviv Cohen, Eddy Bobritsky, Israel Levy, Ariel Koren
    With cyber attacks and breaches on the rise, cyber resilience is becoming an area of focus for C-suite executives worldwide. It is no longer a question of "if" a breach will occur, but "when," and organizations are looking to include cyber resilience as part of their business continuity and disaster recovery programs.

    Join security and business continuity experts as they review:
    - Threats to cyber resilience and business continuity
    - Lessons from Wannacry (ransomware) and NotPetya (wiper) attacks
    - Attack trends and business preparedness
    - Steps for enterprises to take today

    Panellists
    Aviv Cohen, CMO, Pcysys
    Ariel Koren, CTO, SNDBOX
    Israel Levy, CEO, Bufferzone Security
    Eddy Bobritsky, Founder & CEO, Minerva Labs
  • Top Challenges for CISOs and How to Solve Them Recorded: Jan 29 2019 46 mins
    Aviv Grafi, Guy Dagan, Noam Erez, Kobi Freedman, Avivit Kotler
    According to a recent study, having a lack of influence in the boardroom is a key reason why 84% of CISOs in North America believe there is no way to avoid a data breach. How are CISOs addressing the ever-growing cyber threat landscape, disappearing security perimeter and the chronic lack of skilled security professionals? What do they need to communicate and how, to get the board on their side?

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technolofy and human talent
    - Coping with analyst fatugue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    Noam Erez, co-founder and CEO, XM Cyber
    Aviv Grafi, CEO and co-founder, Votiro
    Guy Dagan, Cofounder and Partner, Consienta
    Avivit Kotler, CISO - Head of Cyber Security & Business Continuity, Clal Insurance
    Kobi Freedman, Co-founder & CEO, IDRRA
  • IoT Cyber Attacks and Proactive Security Recorded: Jan 29 2019 56 mins
    Moshe Shlisel, Udi Solomon, Ari Eitan, Guy Dagan
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Panellists
    Ari Eitan, VP of Research, Intezer
    Udi Solomon, CEO & Co-Founder, ShieldIoT
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta
  • Addressing the Cyber Threats on the Horizon Recorded: Jan 29 2019 41 mins
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Privacy Trends and Priorities for 2019 Recorded: Jan 28 2019 62 mins
    Chris Pierson (BLACKCLOAK), Alyssa Coley (Aleada), Sarah Squire (Ping Identity)
    Consumers are increasingly concerned about the privacy of their personal data, and businesses are starting to pay attention. Privacy came into focus in 2018, not only because GDPR went into effect following months of hype, but also because of the steady stream of high-profile hacks and breaches, as well as media attention on how some of the biggest tech companies have been harvesting, storing and sharing user data.

    On Data Privacy Day, join the experts to learn more about:
    - Why your business strategy should include data privacy
    - Data protection regulations around the world
    - The biggest data privacy events in 2018
    - What to look out for in 2019

    Speakers:
    - Christopher Pierson, Founder & CEO, BLACKCLOAK
    - Alyssa Coley, Associate, Aleada Consulting
    - Sarah Squire, Senior Technical Architect, Ping Identity
  • [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond Recorded: Jan 17 2019 65 mins
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace.
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • Beyond the Marriott Breach - What to Expect in 2019 Recorded: Dec 19 2018 64 mins
    Speakers: Nir Gaist, CTO/Founder and Robert Zamani, Director of Solutions Architect. Moderator: Rene Kolga, Product
    What will 2019 bring for the security landscape? How many Marriott-like breaches should you expect? What new types of attacks are you likely to see, and what can you do now to prepare for them? Nyotron’s team of security experts will have the answers for you during our December 19th live webinar.

    Making informed predictions first requires thinking back on 2018 with a critical eye. We will review a few of the most significant vulnerabilities and data breaches that made national headlines, from the City of Atlanta to Meltdown and Spectre, to the Marriott debacle and why the healthcare industry appears unable to defend itself. Our panel will also discuss the issues and trends they expect will dominate 2019, including adversarial artificial intelligence (AI) and destructive attacks on ICS.

    We will wrap up with ideas on how you can make an effective case for additional security budget and how to educate yourself about the changing threat landscape (and to get those CPE’s before the year’s end).
trends, developments, and technology
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: DevOps Culture Shift: Expanding On-Call Responsibilities
  • Live at: Sep 16 2015 6:00 pm
  • Presented by: Todd Vernon, VictorOps Founder & CEO
  • From:
Your email has been sent.
or close