- This event has passed so registration is closed.
Recent supply chain attacks, along with the U.S. Executive Order on Cybersecurity, have raised the priority of software security. At the same time, security and compliance teams may feel that security risk is a bit out of control given the rapid evolution of DevOps. With all eyes on secure coding, how do you ensure proper depth and breadth of app sec testing? How do you meet development deadlines without slowing down for security? This talk will address how to best approach modern software security by automating your CI pipeline for simplicity, visibility, and control.
You will learn:
- What's changed that makes
- Redefining the DevSecOps approach to meet these new challenges
- 5 key requirements to achieve DevSecOps 2.0
Lee Neely – Information Assurance APL, LLNL
Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely
Cindy Blake – Senior Security Evangelist, GitLab
Cindy Blake is the Senior Security Evangelist at GitLab, a leader in the DevOps market with an innovative single application approach for the entire software development lifecycle. Cindy Blake collaborates around best practices for integrated DevSecOps application security solutions with major enterprises. Last year she introduced her book, “The CISOs Guide to Securing Next-Gen Software” that combines nearly a decade of cyber security experience with a background in lean and software development to simplify the complexities of today’s software evolution into pragmatic advice for security programs. Prior to GitLab, Cindy worked as a strategic planning consultant covering app sec, endpoint security, and Security Information and Event Management (SIEM), and MSP security services. Previously, as part of the Hewlett Packard Enterprise (HPE) Fortify team, she led early third party research on the intersection of development, security, and operations. Cindy has a broad IT background in high tech, healthcare and energy starting her career as a software developer, architect, and then IT leader.
Manish Sharma – Vice President - Cloud, Security & Operations Group, Aurigo Software Technologies
Manish Sharma is Vice President – Cloud, Security & Operations Group at Aurigo Software, leading cloud strategy & operations, DevSecOps, information security, enterprise IT, and digital transformation for the entire portfolio of products. Manish’s unique abilities lie in analyzing dissonant data points, filtering out the noise, and executing programs with precision to advance business objectives. A notable organization builder, Manish is a change agent who fosters a shared vision to drive results.
Before working at Aurigo, Manish held leadership positions at Hewlett Packard Enterprise, supporting some of the firm’s largest accounts. Prior to that, he spent over a decade directing software strategy and technology transformation for Alcatel-Lucent.
Manish has a Computer Engineering degree from the University of Rajasthan and has completed an executive education program in Supply Chain Strategy & Management from MIT’s Sloan School of Management. Besides completing over a dozen professional certifications, including CISSP, Manish has a black belt in Taekwondo and is a Distinguished Toastmaster (DTM). He is also a regular volunteer at the Boys Scouts of America (Scouting BSA). Manish lives with his family in Austin, TX.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.