- Presentations
- Documents
- Infographics
GDPR - Do It Yourself
George Dragusin
•
6 years ago
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (RSA Conference 2016)
Sounil Yu
•
8 years ago
7 Wastes of Change Management
Jason Little
•
9 years ago
ITIL and DevOps can be friends
Jan-Joost Bouwman
•
8 years ago
DevSecCon KeyNote London 2015
Shannon Lietz
•
8 years ago
SecDevOps: Development Tools for Security Pros
Denim Group
•
8 years ago
Building a Mobile Security Program
Denim Group
•
8 years ago
Creating Alignment for Agile Change - Agile and Beyond 2015
Jason Little
•
9 years ago
Security Operation Center - Design & Build
Sameer Paradia
•
9 years ago
Operating Docker
Jen Andre
•
8 years ago
Application Security Assessments by the Numbers - A Whole-istic View - OWASP AppSec EU 2015
Denim Group
•
8 years ago
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerability Management Your Ally
Denim Group
•
9 years ago
Containerization is more than the new Virtualization: enabling separation of operational concerns
Jérôme Petazzoni
•
9 years ago
Implementing An Automated Incident Response Architecture
Priyanka Aash
•
9 years ago
DevOps Metrics - Lies, Damned Lies and Statistics
Gaetano Mazzanti
•
9 years ago
DevOps 101
Ernest Mueller
•
9 years ago
Maersk Line's Agile Journey LESS 2012
OzlemYuce
•
11 years ago
ICS Network Security Monitoring (NSM)
Digital Bond
•
9 years ago
Monktoberfest Fast Delivery
Adrian Cockcroft
•
9 years ago