Session
How SecOps can help developers build highly secure software
It's getting faster for adversaries to weaponize vulnerabilities. On average it's become 3 days now, as we've seen lately with some vulnerabilities which have come out. There is a significant reduction of cost, if you fix vulnerabilities before they get to production. We all know how it takes downtime to fix things in production, find where there is a vulnerability and there's a lot of complexity in that. Companies are not focused in this area, so they're not looking at security inside of their source code management systems and taking care of it there, but rather things are getting into production. Have you ever asked yourself, who's responsible for fixing these things? It's everybody really. If you look at this in the form of a security responsibility journey, you have your centralized security Teams, that usually have optics into security vulnerabilities, and you have developers that are focused on fixing vulnerabilities, but there is a pretty big divide between what both teams see. That's why in this session I explore how to give visibility on both ends. Showing security operators vulnerabilities in code and telling developers the same thing to help them fix those vulnerabilities.
Bojan Magusic
Product Manager | Customer Experience Engineering @Microsoft
Dublin, Ireland
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top