Rosalind Radcliffe – Rosalind Radcliffe – DevSecOps and your system of record

Rosalind Radcliffe – Rosalind Radcliffe – DevSecOps and your system of record

30m

Rosalind Radcliffe of IBM talks about role of DevSecOps in System of Records, in legacy systems. System of Records needs to be as secure as others.

0
Share some ❤
Date: September 9, 2020
Play
My List

2020 DevOps India Summit

Bhuvaneshwari Subramani - Embracing Security in DevOps in-light of AWS

Bhuvaneshwari Subramani - Embracing Security in DevOps in-light of AWS

BMK Lakshminarayan - DevOps is Right, DevSecOps is Left, Risk & Governance in the Middle

BMK Lakshminarayan - DevOps is Right, DevSecOps is Left, Risk & Governance in the Middle

Dheeraj Nayal - Accelerating the Secure DevOps hybrid skills in the new normal

Dheeraj Nayal - Accelerating the Secure DevOps hybrid skills in the new normal

Garima Bajpai - Trust, Reliability & Governance- Three Pillars of DevSecOps

Garima Bajpai - Trust, Reliability & Governance- Three Pillars of DevSecOps

Hasan Yasar - 5 common challenges to implement DevSecOps successfully

Hasan Yasar - 5 common challenges to implement DevSecOps successfully

Himabindu Vejella - Digital Forensics- Adversary to Opportunities

Himabindu Vejella - Digital Forensics- Adversary to Opportunities

Building Continuous security ways of working Overcoming the challenge of security testing adoption through Lean Canvas Design

Building Continuous security ways of working Overcoming the challenge of security testing adoption through Lean Canvas Design

Manjula Patil + Kedar Kulkarni - Application Modernization: A DevSecOps approach

Manjula Patil + Kedar Kulkarni - Application Modernization: A DevSecOps approach

Marc Hornbeek - Continous Security Maturity Assessment

Marc Hornbeek - Continous Security Maturity Assessment

Mirco Hering- Implementing DevSecops from my experience of large organizations and providing Tips & Tricks on how to approach it

Mirco Hering- Implementing DevSecops from my experience of large organizations and providing Tips & Tricks on how to approach it

Suman Chakraborty- Best Practices Implemented Natively to Secure Kubernetes Cluster

Suman Chakraborty- Best Practices Implemented Natively to Secure Kubernetes Cluster

Vandana Verma - Kickstarting DevSecOps with OpenSource Tools

Vandana Verma - Kickstarting DevSecOps with OpenSource Tools

Yury Nino - Security Chaos Engineering- Cyberattacks are a new challenge for Chaos Engineering

Yury Nino - Security Chaos Engineering- Cyberattacks are a new challenge for Chaos Engineering

Sailaja Vadlamudi - Security Compliance By Design and Default

Sailaja Vadlamudi - Security Compliance By Design and Default

Ankit Gupta - Enterprise approach for implementing DevSecOps

Ankit Gupta - Enterprise approach for implementing DevSecOps

Biswajit Mohapatra - DevSecOps : Paving the way for Digital Reinvention

Biswajit Mohapatra - DevSecOps : Paving the way for Digital Reinvention

Dr Niladri Choudhuri - SREs are responsible for Reliability- System is reliable only when it is secure too

Dr Niladri Choudhuri - SREs are responsible for Reliability- System is reliable only when it is secure too

Mark Miller - Making the case for DevSecOps

Mark Miller - Making the case for DevSecOps

Nivarti Jayaram - Build Security In- Significance of Threat Modelling

Nivarti Jayaram - Build Security In- Significance of Threat Modelling

Piotr Lewandowski - Lessons we learned at Google that allowed us to build and maintain secure and reliable systems

Piotr Lewandowski - Lessons we learned at Google that allowed us to build and maintain secure and reliable systems

Ramesh Pasapula - Grading the security of your CI/CD Pipeline

Ramesh Pasapula - Grading the security of your CI/CD Pipeline

Alan Shimel - DevSecOps: The New Normal

Alan Shimel - DevSecOps: The New Normal

Marudhamaran Gunasekaran - Assuring Compliance in Dev SecOps

Marudhamaran Gunasekaran - Assuring Compliance in Dev SecOps

Santanoo Bhattacharjee - Essence of Security into DevOps Value Stream

Santanoo Bhattacharjee - Essence of Security into DevOps Value Stream

Leave Review

Your email address will not be published. Required fields are marked *

ARE YOU IN?

Get enhanced value from the site through the exclusive “members-only” content. 200,000+ subscribers already enjoy our premium stuff.