How to Build a DevOps Supply Chain on Zero-Trust Principles
OnlineOver the past decade, the concept of Zero Trust has become a fundamental part of cybersecurity architecture. In fact, the concept of Zero Trust is behind most common network security policies, which require continuous and explicit validation, use least privilege access controls, and assume that a breach could have already occurred and we are simply not yet aware of it. Zero Trust has been fundamental in securing enterprise networks from cyber attackers. However, in recent years, cyber attackers are turning their attention away from network based attacks to finding code based vulnerabilities. In this talk series they will discuss how Zero Trust principles, applied so effectively to enterprise network security, can also be applied to continuously protecting the Software Development Lifecycle from would-be attackers. Session Topics Include: "Walking the Line: GitOps and Shift Left Security" with Melinda Marks, Sr. Analyst at ESG "Building a DevOps Supply Chain on Zero Trust Principles" with Bisham Kishnani, Head of Cloud Security Engineering at Check Point Software Technologies "Practitioners Discussion on Developer First Security" with Dotan Nahum, Head of Developer Security at Check Point Software Technologies