InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Harnessing Cloud DevOps Techniques to Bolster Zero Trust Security

Presented by

Jyotirmayee Pradeep Kumar, Vice President - CoreDev DevOps | International Banking

About this talk

Every minute your cloud infrastructure grows, it creates new entry points for potential attacks. As organizations rush to embrace cloud innovations, they're unknowingly building digital labyrinths where traditional security measures fall short. This expanding digital maze demands a smarter approach to security—one that treats every access request, internal or external, as a potential threat. While organizations recognize the need for Zero Trust architecture, implementing it effectively within Cloud DevOps workflows presents unique challenges. The integration must seamlessly span across containers, cloud services, code repositories, and third-party components without creating bottlenecks in the development pipeline. By embedding Zero Trust principles directly into DevOps processes, organizations can achieve continuous security validation at every stage of the software delivery lifecycle, transforming security from a potential impediment into a competitive advantage. Join Jyotirmayee Pradeep Kumar, Vice President of Cloud DevOps at a leading global bank, as she reveals practical strategies for weaving Zero Trust security into every phase of your Cloud DevOps journey. Key Takeaways: - Learn proven methodologies for implementing Zero Trust controls across your CI/CD pipeline while maintaining development velocity - Discover best practices for securing infrastructure as code, container deployments, and cloud services using Zero Trust principles - Master techniques for implementing robust identity and access management within automated DevOps workflows - Gain insights into establishing effective monitoring and observability patterns that align with Zero Trust architecture - Understand how to create a seamless security framework that spans from code commit to production deployment
Information Security

Information Security

259138 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics