SlideShare a Scribd company logo
1 of 81
Download to read offline
BATMAN
STRATEGIES
S E L E N I U M DAY – 3 1 J A N 2 0 2 0
Misys
BFL
Helping companies turn to towards
their intelligence and otherwise.
Consultant with companies to help
them in their agile, business transformation
and digital transformation journeys
Training and mentoring Architects and
Technology leaders
Enterprise Architecture Expert with the
Digital India Initiative
ExVice Chair TOGAF® Standing
Committee
Governing Board Member CCICI
WHAT DO I DO ?
DE COMPOSITION FALLACY
NOTHING + NOTHING = NOTHING
NOTHING + NOTHING = SOMETHING
“YOU’RE NOT THE DEVIL. YOU’RE PRACTICE.” – BATMAN
BUILD
Compiling source files
Packaging compiled files into compressed formats (such as jar,
zip)
Producing installers
Creating or updating of database schema or data
Reduce errors
Testing in time consuming and expensive
Does not require Human intervention
AUTOMATE
TEST
Too Many Test cases
Every other day there are new devices and scenarios
proliferating
Leave no stone unturned
DEVS CHURN CODE
CheckIn Continuous
Testing
Continuous
Deployment
Continuous
Monitoring
Configuration
Management
Containerization
Continuous
Integration
B AT M A N – A L L O V E R T H E P L A C E
GIT
JENKINS
SE
PUPPET DOCKER
JENKINS
AUTOMATE
ACROSS ENVIRONMENTS
MostlyTest Env
Docker 1.9 can be
used in prod
NAGIOS
PLAN DEV SVS BUILD TEST DEPLOY
CHECKIN
TRIGGER PULL
TEST FAILSFEEDBACK
CHECKIN
FEEDBACK
PUSHTO PRODUCTION
TEST PASS
IT IS ABOUT AUTOMATINGTHIS LOOP
USER STORIES
FEATURES
EPICS
USER STORIES
FEATURES
EPICS
JIRA IDE
GIT JENKINS PULSE PUPPET
THE DEATH OF ELAINE HERZBERG & ADVENT OF CARS
Credit:Getty Images/iStockphoto
WILL AITAKE CARE OFTHE EDGE CASES ?
The list of things that can go wrong for an
autonomous vehicle “is almost infinite,”
Luc Vincent, who heads R&D for Lyft’s self-driving car unit.
If you went down a narrow one way street that was blocked off by construction is it
okay to break the law and back down the one way street?
Could the car handle teenagers pranking and yelling conflicting commands?
Can the car understand hand signals from police or road-side workers?
Can the car recognize a fake street sign that someone put up or a damaged one?
https://www.linkedin.com/pulse/ais-phoenix-project-moment-daniel-jeffries/
EDGE CASESTHAT ARE EDGY
ENTERTEST CASES &TESTING ITSELF
“We have machines that learn in a very
narrow way,” said Bengio. “They need much
more data to learn a task than human
examples of intelligence, and they still make
stupid mistakes.” Yoshua Bengio, director of Mila (AI institute in Montreal)
TEST CASES WERE MINIMAL WHENTHINGS WERE
WATERFALL AND THE APPLICATION WAS USED
WITHIN A FIREWALL.
WITH A APPLICATION NOW USED BY MILLIONS
OF USERSTHE EDGE CASES ARE MIND BLOGGLING
WHAT ARE WE MISSING HERE ?
Courtesy :Henrik Kniberg
SECURITY
ONLY AUTOMATION CANTAKE CARE OFTHIS DUAL MODE AGILE NEED
Courtesy : Marty Cagan
Browsers
Devices
Operating Systems
Rapid Rate of New Code Being Pushed
Machine do not show Fatigue or Human Errors
Leave No Stone Unturned
Catch Defects before they are shipped
WHY AUTOMATE ?
UNITTESTING
INTEGRATIONTESTING
END TO END TESTING
https://www.getzephyr.com/insights/role-unit-tests-test-automation
TEST AUTOMATION PYRAMID
UNIT
INTEGRATION
E2E
SPLIT UPYOURTEST CASES INTHE FOLLOWING MANNER
70 %
20 %
10 %
ENTER ROBOT EXIT HUMAN – IT DOES NOT WORKTHATWAY
Picture : pixabay
Reduce errors
Testing in time consuming and expensive
Difficult to set Multi Lingual Sites
Does not require Human intervention
Speed and Extensive coverage
Machines do not fatigue
RepetitiveTests
Time consuming and Manual difficult
Time Intensive
Mission Critical BusinessTest Cases
When Automation
Test Cases are needed ?
WHY AUTOMATE ANDWHENTO ?
WHERE MANUALTESTING EXCELS ?
New test cases not even tested once manually
Requirements Changing frequently
Need cognitive thinking to make sense of the use cases
NEED FOR EVERYTHING COUNTINOUS AND BOUNDARY LESS
NOT ONLY IN PRODUCT PIPELINES BUT ALSO IN INDUSTRYVALUE CHAINS
AGE OF BOUNDARYLESS INFORMATION FLOW
APIs EVERYWHERE
Courtesy : DZone
APIsWITHIN AVALUE CHAIN
GHOST RIDES SCAM
In 2017, the Equifax credit reporting agency
used Struts in an online portal, and due to
Equifax not identifying and patching a
vulnerable version of Struts, attackers were
able to capture personal consumer information
such as names, Social Security numbers, birth
dates and addresses of over 148 million US
consumers, nearly 700,000 UK residents, and
more than 19,000 Canadian customers.
VALUE CHAIN CUTTING ACROSS MANY DOMAINSTO ACHIEVE BUSINESS OUTCOME/VALUE
Continuous
Everything
Continuous
Production
Continuous
Integration
Continuous
Automation
Continuous
Governance
Continuous
Monitoring
Continuous
Testing
WHERE DOESTHIS LEAVE US WITH SECURITY ?
Continuous
Security
CAN SECURITY PACE WITHTHE RATE AT WHICH CODE IS PUSHED ?
DEV SECOPS / SEC DEV / RUGGED DEV OPS
= SECURITY AUTOMATION AT SCALE
ENTER
IMPACT OF SECURITY ON BUSINESS
Proliferation of Shadow IT
Business Agility impacted due to slow security cycles.
Security unable to keep pace with Business
Adhoc projects and rogue development
True DevOps requires maturity
Slow threat assessments
Not enough patching
Reactive security posture of the company
SECURITY OPERATIONS
CAUSAL LOOP FOR DEVOPSECOPS IS A HUMUNGOUSTASK
https://www.linkedin.com/pulse/dynamics-devops-adoption-dr-pallab-saha/
CAUSAL LOOP FOR DEVOPS
1. We need to discover a solution that is valuable, usable, feasible and viable.
2. We need to deliver a solution that is reliable, scalable, performant and
maintainable.
& Of Course SECURE
WHATWE ARE NOT CAPTURING ARETHE UNDERLYING ISSUES
Value Risk - will they use/buy it?
Usability Risk - can they use it?
Feasibility Risk - can we build it?
Business Viability Risk - will this work for our business?
Security Risk – Is our solution vulnerable ?
SOLVE OR BRAINSTORM ONTHESE RISKS BEFOREYOUWRITE A LINE OF CODE
Gartner predicted that 25 percent of
top global 2000 organizations would
have adopted DevOps as a
mainstream strategy
CI / CD Solution is one
of the important tools for
DEVSECOPS
DEV SEC OPS -WHY
Pace of innovation meets – Pace of Security Automation
Scalable Architectures need Scalable Security
Vulnerabilities need to be healed at the rate at which software is getting churned.
Risk Identification and Remediation at the speed of delivery
Slow threat assessments
Can't patch fast enough
Reactive security posture
Lack of business agility
Slow to onboard new customers
Slow turn around time
Trailblazer dev projects gone wrong
Lack of SecOps agility
PROBLEMS ASTHEY STAND
DEVELOPMENT
ARCHITECTURE
QA
OPERATIONS
TRADITIONAL S/W DEVELOPMENT – NOT CONTINOUS
WHAT WE NEED ?
MONITORING
&
SECURITY
TO BE ADDEDTO
MAKE IT CONTINOUS
CLOUD ADDS TO THE COMPLEXITY
MOVING TO THE CLOUD
BABY STEPS
MORE THAN ONE
CLOUD
MULTI
CLOUD SCENARIO
SECURITY RESOURCES
& CHECKLISTS
COMPLIANCE AND
REGULATIONS
OPEX
DEVS
OPS
DESIGN
REVIEW
TEST
UNITTEST
MOCK TESTS
PERFORMANCE
SECURITY
MEMORY MANAGEMENT
NRFS
SECURITY
RESPONSIVE NESS
RUN STUFF
BREAK THE BUILD
REPEAT
HOW DEVELOPERS SEE OPS FOLKS ?
WHAT DEVELOPERS WANT ?
Ease of checking in and checking out
Able to play and experiment with emerging technologies
Ability to push code regardless of the platform
ABOVE ALL A GOOD NIGHTS SLEEP
DEVS
DEV
ITIL COMPLIANCE
REDUCE CARBON
FOOTPRINT
TEST
GO GREEN
SUPPORT DIFF ENVS
TICKETING
SECURITY
VIRTUALIZE
CMRB
PCI DSS
KEEPTHE LIGHTS ON
WRITE CODE
TEST SOME AND
RELEASE
HOW OPERATIONS FOLKS SEE DEVELOPERS
NETWORKS
OS
ACCESS CONTROL
WHAT MAKES SECURITY FOLKS RELAX
ALLVULNERABILITIES ARE DISCOVERED AND FIXED INTIME
ALL COMPLIANCES AND REGULATIONS ARE MET
ALL ATTACKS HAVE A PLANNED STRATEGY AND NO SURPISES
ABLE TO KEEP IN PACEWITHTHE SPEED OF DEVELOPMENT
AUTOMATED PROCESSES FOR STATIC AND DYNAMICTEST ( SAST , DAST , IAST )
WHAT WE NEED IS TOOLS AND PROCESS ?
MONITORING
&
SECURITY
TO BE ADDEDTO
MAKE IT CONTINOUS
CHECKS PRESENT
CHECKS PRESENT
NEEDS ACTION
NEEDS ACTION
NEEDS ACTION
NEEDS ACTION
Static application security testing (SAST)
MILLION DOLLAR QUESTION ?
WHO BROKETHE BUILD ?
DO NOT LET SECURITY BREAKYOUR BUILD
When Cl breaks (and it breaks) it impacts everyone and everything in the process.
Creating a significant delay in the release cycle.
Start implementing security before the Continuous integration stage.
If you have 365 developers and each developer breaks only a single build once a year (usually much
more), you have an average of one build break per day.
SECURITY CANNOT BE A BLOCKER IT HASTO KEEP PACE
SECURITY WISH LIST
OPERATIONAL CHECKS
AUTOMATIC FAULT DETECTION
AND CORRECTION
AUTOMATION REMIADIATION
AUTOMATIC AUDITING & FORENSICS
CODE LEVEL CHECKS
SECURE CODING PRACTICES
PRO ACTIVE CONTROLS IN THE CODE
BUILD LEVEL CHECKS
VULNERABILITY CHECKS
CONFIGURATION SCRUBBING
DEPLOY CHECKS
CONTINOUS VULNERABILITY SCANS
PICK ONLY AUTHENTIC IMAGES
GRANT JUST ENOUGH SERVER ACCESS
Command and
Control
Low trust
Organizations
Empowered
High trust
Organizations
DEVOPS IS FOR HORSESTOO NOT ONLY UNICORNS
IFYOU CAN DO IT FOR SAPYOU CAN DO IT FOR ANYTHING
PROBLEMS & SOLUTIONS
IN FRONT OF US
SECURINGYOUR PIPELINES
PUSHTHE RESPONSIBILTYTOTHE DEVELOPERS
AIM FOR LESS FALSE POSITIVES
AIM FOR HIGH QUALITY
AIM FOR SPEED OF DELIVERY
SECURITY NEEDS MORETHAN JUST LIP SERVICE
Typically the ratio of DEVto OPSto SEC is 100/ 10 / 1
APPLICATION SECURITY
ACCOUNTS FOR
ABOUT
29 ~ 40 % OF ALL BREACHES
Automatic has issues as
Security Issues if found cannot be
stopped
AUTOMATE AUTOMATE AUTOMATE AS MUCH AS POSSIBLE
GETTHE DEVS ANDTHE OPSTO READ AND INTERPRETTHE RESULTS
ADD REQUIREMENTS INTHEVERY BEGINNING AT DESIGN AND REQUIREMENTS
BUILD BREAKS IFVULNERABILITIES NOTICED INTHE CHECKIN
THE NETFLIX WAY
Aardvark and Repokid
PRINCIPLE OF LEAST PRIVILEGE
Positive testing determines that your application works as expected. If an error is
encountered during positive testing, the test fails.
Negative testing ensures that your application can gracefully handle invalid input or
unexpected user behavior.
Invite both sides of the table to the meeting DEV and OPS
Incidents
Threat Modelling
Security Sprints Etc.
MEASURE MEASURE & MEASURE
FEED BACK PENETRATION RESULTS INTO UNITTEST
CREATE A CULTUREWHICH IS HIGH ONTHE SECURITY DNA
Make it public when you fix things and update on internal wiki
Share Point or CMDB for all fixes on Security
Do not make it personal fix the issue not the person
Arrange for tech talks to spread the know how of the fixes
Educate DEV and OPS to read security tool analysis well
Shadow resources who could build capabilities
The further right the project is on the DevOps scale the
further
left it should start implementing security checks
COST OF NOT FIXING ATTHE RIGHTTIME
SHIFT LEFTTO GAIN
Courtesy :Tanya Janca, Senior Cloud Developer Advocate, Microsoft
MOVE SECURITY UPTHE CHAIN IN REVERSE ORDER
Courtesy :Tanya Janca, Senior Cloud Developer Advocate, Microsoft
CONTINOUS LEARNING IS KEY
ACTION ITEMS POST THIS CONFERENCE
Add security verification to Cl/CD Pipelines
Critical security bugs break the build
In the first three months following this presentation you should:
Create Negative Unit Tests from existing positive unit tests
Lessons on top 3 security bugs
High security bugs break the build
Within six months you should:
Regular lessons on AppSec, including a security exercise or simulation
Improvements of security processes for speed and removal of obstacles
Creation of parallel security pipeline
Medium security bugs break the build
NEXT STEPS FORYOU
LIST OFTOOLS OUTTHERE
https://www.esecurityplanet.com/network-security/security-automation-and-orchestration-soar.html
https://www.youtube.com/watch?v=sJ2ott9yAlE
REFERENCES
https://www.youtube.com/watch?v=pDY639JsT7I
https://www.linkedin.com/pulse/ais-phoenix-project-moment-daniel-jeffries/
https://www.agilealliance.org/glossary/automated-build
https://blog.rapid7.com/2017/07/06/soc-automation-best-practices/
https://www.youtube.com/watch?v=iKA_chn8P4c
https://www.youtube.com/watch?v=uFpsO4jnV_Q
https://www.youtube.com/watch?v=RJafMxfQ_IY
www.eturnti.com
kiran@eturnti.com
kirandivakaran@gmail.com
twitter : @eturnti
Kiran Divakaran

More Related Content

What's hot

Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...AgileNetwork
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...Cyber Security Alliance
 
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?NUS-ISS
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessJames Wickett
 
DevSecOps and the New Path Forward
DevSecOps and the New Path ForwardDevSecOps and the New Path Forward
DevSecOps and the New Path ForwardJames Wickett
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)Zero Science Lab
 
Creating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar SeriesCreating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar SeriesCisco Canada
 
Agile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsAgile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsTechWell
 
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREA Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREJames Wickett
 
Your Code Isn’t Static. Your Processes Shouldn’t be Either.
Your Code Isn’t Static. Your Processes Shouldn’t be Either.Your Code Isn’t Static. Your Processes Shouldn’t be Either.
Your Code Isn’t Static. Your Processes Shouldn’t be Either.DevOps.com
 
Lost in Translation: A Handbook for Information Systems in the 21st Century
Lost in Translation: A Handbook for Information Systems in the 21st CenturyLost in Translation: A Handbook for Information Systems in the 21st Century
Lost in Translation: A Handbook for Information Systems in the 21st CenturyCapgemini Media
 
Upskilling: Adapting Humans At The Speed of DevOps
Upskilling: Adapting Humans At The Speed of DevOpsUpskilling: Adapting Humans At The Speed of DevOps
Upskilling: Adapting Humans At The Speed of DevOpsDevOps.com
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseJames Wickett
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Permission Boundary Round: AWS Security Week at the San Francisco Loft
Permission Boundary Round: AWS Security Week at the San Francisco LoftPermission Boundary Round: AWS Security Week at the San Francisco Loft
Permission Boundary Round: AWS Security Week at the San Francisco LoftAmazon Web Services
 

What's hot (20)

Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
 
Resume
ResumeResume
Resume
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 
DevSecOps and the New Path Forward
DevSecOps and the New Path ForwardDevSecOps and the New Path Forward
DevSecOps and the New Path Forward
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Creating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar SeriesCreating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar Series
 
Agile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective ActionsAgile Project Failures: Root Causes and Corrective Actions
Agile Project Failures: Root Causes and Corrective Actions
 
Introducing the Development Director
Introducing the Development Director Introducing the Development Director
Introducing the Development Director
 
A Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASUREA Way to Think about DevSecOps: MEASURE
A Way to Think about DevSecOps: MEASURE
 
Your Code Isn’t Static. Your Processes Shouldn’t be Either.
Your Code Isn’t Static. Your Processes Shouldn’t be Either.Your Code Isn’t Static. Your Processes Shouldn’t be Either.
Your Code Isn’t Static. Your Processes Shouldn’t be Either.
 
Lost in Translation: A Handbook for Information Systems in the 21st Century
Lost in Translation: A Handbook for Information Systems in the 21st CenturyLost in Translation: A Handbook for Information Systems in the 21st Century
Lost in Translation: A Handbook for Information Systems in the 21st Century
 
Upskilling: Adapting Humans At The Speed of DevOps
Upskilling: Adapting Humans At The Speed of DevOpsUpskilling: Adapting Humans At The Speed of DevOps
Upskilling: Adapting Humans At The Speed of DevOps
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
 
Devsec ops
Devsec opsDevsec ops
Devsec ops
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Permission Boundary Round: AWS Security Week at the San Francisco Loft
Permission Boundary Round: AWS Security Week at the San Francisco LoftPermission Boundary Round: AWS Security Week at the San Francisco Loft
Permission Boundary Round: AWS Security Week at the San Francisco Loft
 

Similar to Build Automate and Test Strategies - BATMAN

DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps.com
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - dbDavid Bressler
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainTeam MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainJames Neo
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldMark Nunnikhoven
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Who owns Software Security
Who owns Software SecurityWho owns Software Security
Who owns Software SecuritydevObjective
 
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...Yazad Khandhadia
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Security Innovation
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 
A Modern Platform Approach for Creating Smart Connected Products
A Modern Platform Approach for Creating Smart Connected ProductsA Modern Platform Approach for Creating Smart Connected Products
A Modern Platform Approach for Creating Smart Connected ProductsMark Benson
 

Similar to Build Automate and Test Strategies - BATMAN (20)

DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - db
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe AgainTeam MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe Again
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Who owns Software Security
Who owns Software SecurityWho owns Software Security
Who owns Software Security
 
Who Owns Software Security?
Who Owns Software Security?Who Owns Software Security?
Who Owns Software Security?
 
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...Shift Left Security – Guidance on embedding security for a Digital Transforma...
Shift Left Security – Guidance on embedding security for a Digital Transforma...
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?Car Cybersecurity: What do Automakers Really Think?
Car Cybersecurity: What do Automakers Really Think?
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
A Modern Platform Approach for Creating Smart Connected Products
A Modern Platform Approach for Creating Smart Connected ProductsA Modern Platform Approach for Creating Smart Connected Products
A Modern Platform Approach for Creating Smart Connected Products
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Build Automate and Test Strategies - BATMAN