Presentation: The Emergent Cloud Security Toolchain for CI/CD
Speaker: James Wickett – Head of Research, Signal Sciences
All organizations want to go faster and decrease friction in their cloud software delivery pipeline. Infosec has an opportunity to change their classic approach from blocker to enabler. This talk will discuss hallmarks of CI/CD and some practical examples for adding security testing across different organizations. The talk will cover emergent patterns, practices and toolchains that bring security to the table.
James spends a lot of time at the intersection of the DevOps and Security communities. He works as Head of Research at Signal Sciences and is a supporter of the Rugged Software and DevSecOps movements. Seeing the gap in software testing, James founded an open source project, Gauntlt, to serve as a Rugged Testing Framework. He is the author of several security and DevOps courses onLinkedIn Learning, including: DevOps Foundations, Infrastructure as Code, DevSecOps: Automated Security Testing, Continuous Delivery (CI/CD), and Site Reliability Engineering.
He got his start in technology when he founded a startup as a student at the University of Oklahoma and has since worked in environments ranging from large, web-scale enterprises to small, rapid-growth startups. He is a dynamic speaker on topics in DevOps, AppSec, InfoSec, cloud security, automated security testing, DevSecOps and serverless.
James is the creator and founder of the Lonestar Application Security Conference which is the largest annual security conference in Austin, TX. He also runs DevOps Days Austin and previously served on the global DevOps Days board. He also bears several security certifications including CISSP and GWAPT.
In his spare time he is trying to learn how to make a perfect BBQ brisket.
|Title:||Head of Research|
|Delivering the market’s first Identity and Access Threat Prevention platform. We help customers preempt security threats in real time based on identity, behavior and risk.|
Luncheon Meeting Schedule:
|11:15 a.m.||Registration / Networking|
|11:30 a.m.||Luncheon / Networking|
|11:45 a.m.||Chapter Business Meeting|
|12:00 noon||Keynote Presentation|
|1:00 p.m.||Adjourn Luncheon|
- Background in Information Security.
- 1 CPE