SlideShare a Scribd company logo
1 of 64
Download to read offline
Dev???Ops
The Missing Middle: Security
Elizabeth Ayer
18F - TTS - GSA
@ElizAyer
Agile 2019
DevSecOps @ElizAyer
I am going to show you today how to get more
secure applications delivered faster.
DevSecOps @ElizAyer
But first I am going to tell you how we got less
secure applications delivered more slowly….
Storytime...
DevSecOps @ElizAyer
Key dynamics:
● Everyone had many responsibilities. No matter
what the official priorities, compliance paperwork
came last
● Dev had already damaged trust
● Security was severely underresourced
● Compliance sucked the oxygen from security
● At any point, the director could have made this
happen… but didn’t
DevSecOps @ElizAyer
Truly, everyone did the best job he or she
could, given what was known at the time, his or
her skills and abilities, the resources available,
and the situation at hand.
We could have
been here
But we spent our
time here instead
DevSecOps @ElizAyer
Why bring security into the development
process? [Crowdsourced]
● In any org with formal compliance, ignoring security may mean
delivering late or not at all.
● Can select what controls are important to YOU
○ Can also be platform specific
● Improves security - devs should understand what they might do to
cause a breach. Educate them early.
● Cost of fixing vulnerability is exponential
● Reduces schedule drift - improved flow
● Understand which tools can/can’t be used.
● Task may not be allowed at all
● May need to do major refactoring to incorporate, e.g. encryption
● Platform-level security practices.
● Brand reputation ***
10
DevOps 101
DevSecOps
SEC
v
DevSecOps @ElizAyer
DevOps is...
A combination of philosophies, practices and
tools that increases an organization’s ability to
deliver applications and services at high velocity
- AWS What is DevOps? (Dev Perspective)
DevSecOps @ElizAyer
DevOps is...
[A way to] reduce waste and make releases
boring
- Jez Humble, Author &18F Alumni (Ops perspective)
+Security!
DevSecOps @ElizAyer
DevOps is...
An approach that resolves the apparent conflict
between speed and reliability
Security
fits Here
DevSecOps @ElizAyer
Why isn’t security within the Ops in DevOps?
We call out security separately because:
1) Security is truly a specialist discipline
2) Security got left out of the first wave of DevOps
3) Security is used to encompass compliance, and
that’s definitely not part of DevOps
DevSecOps @ElizAyer
https://slack.engineering/moving-fast-and-securing-things-540e6c5ae58a
DevSecOps @ElizAyer
Why isn’t security within the Ops in DevOps?
We call out security separately because:
1) Security is truly a specialist discipline
2) Security got left out of the first wave of DevOps
3) Security is used to encompass compliance, and
that’s definitely not part of DevOps
DevSecOps @ElizAyerhttps://tech.gsa.gov/guides/dev_sec_ops_guide/
DevSecOps @ElizAyer
DevSecOps is...
Development + Security + Operations =
Safer Software Sooner
DevSecOps @ElizAyer
Digression: Why DevSecOps, not DevOpsSec?
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
One team handles a software system through
inception, delivery, maintenance, end-of-life of a
system.
1. People: the DevOps culture
DevSecOps @ElizAyer
Shared responsibility
for how software behaves in
production
23
Continuous feedback
results in tighter processes
that get better and better
Optimization of the
full system, not just one
piece, department, or interest.
Open communications and
knowledge sharing
enhance trust within the team
1. People: the DevOps culture
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
2. Process: Empowered Teams & Shift Left
An empowered team contains the skills and
authority it needs to develop & operate its systems.
For DevSecOps, the team needs basic security
skills and access to expertise.
DevSecOps @ElizAyer
2. Process: Empowered Teams & Shift Left
“Shift Left” means that operability concerns should
be considered as early in the dev cycle as possible.
+Security!
DevSecOps @ElizAyer
Evil User Story (aka Abuser Story) 1:
As a hacker, I want to have somebody’s benefits
paid to me instead.
2. Process: Empowered Teams & Shift Left
DevSecOps @ElizAyer
Evil User Story (aka Abuser Story) 2:
As the Russian government, I want to steal data and
release it so that I undermine confidence of the
American people in democracy.
2. Process: Empowered Teams & Shift Left
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
3. Tools: CI/CD
● Source Code Management
● CI/CD Systems
● Unit test framework
● Infrastructure-as-code
● etc.
31
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
32
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
Evil User
Stories
33
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
Static Code
Analysis
DevSecOps @ElizAyer
3. Enhancing the Pipeline for Security
Static Application Security Testing (SAST) tools
scan for code patterns likely to cause
vulnerabilities.
Examples: SonarQube (Open Source), Fortify,
Coverity, Veracode
https://www.owasp.org/index.php/Source_Code_Analysis_Tools
35
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
Dynamic
Analysis
DevSecOps @ElizAyer
3. Enhancing the Pipeline for Security
Dynamic Application Security Testing (DAST)
tools scan a running application for
vulnerabilities or assist in manual penetration
testing.
OSS Examples: Arachni, Metasploit, sqlmap*
DevSecOps @ElizAyer
Why would you not point hacker tools at your
application? They will!
Back to the story...
DevSecOps @ElizAyer
Would any of this have helped our Eligibility
System deliver?
Nope.
DevSecOps @ElizAyer
That project was held up by compliance.
DevSecOps @ElizAyer
In order to be compliant, you generally need
controls or a POAM - a Plan of Action and
Milestones.
DevSecOps @ElizAyer
In order to agree what to POAM, you need a
threat model.
How to get towards
DevSecOps
DevSecOps @ElizAyer
Threat modeling: the key to initiating
DevSecOps
Help translate fears into a threat model.
Help translate fears into a threat model.
Help translate fears into a threat model.
1
2
3
What is a threat model? (OWASP)
“Most of the time, a threat model includes:
● A description / design / model of what you’re worried about
● A list of assumptions that can be checked or challenged in the future
as the threat landscape changes
● A list of potential threats to the system
● A list of actions to be taken for each threat
● A way of validating the model and threats, and verification of success
of actions taken
Our motto is: Threat modelling: the sooner the better, but never too late.”
https://www.owasp.org/index.php/Application_Threat_Modeling
Threat Modelling Exercise:
Your trip home from Agile 2019 (from here to when you
walk in your front door).
1. What could go wrong?
DevSecOps @ElizAyer
What could go wrong Agile 2019-> Home
[Crowdsourced]
● Flight delay, cancelled,
● TSA
● Lost luggage, passport/id
● Forget keys (house, car)
● Random act of violence
● Shut down freeways/metro,
beltway traffic
● Car accident
● Personal sickness
● Lose your phone -
● GPS malfunction
●
● Wrong airport
● Alien abduction
● Uber goes out of business
● Water taxi piracy
● Car stolen/hacked
● Call from work for actual
problem, miss transport
● Oversleep
●
Threat Modelling Exercise:
Your trip home from Agile 2019 (from here to when you
walk in your front door).
2. What could you do to prevent or mitigate the
threats?
DevSecOps @ElizAyer
For me….
I would have threat modelled car accidents, traffic,
missed or delayed flights….
DevSecOps @ElizAyer
For me what did happen
I failed to get permissions until literally the last possible second.
All sane flights were gone by the time I could book them.
I did my best and ended up with two separate bookings.
SeaTac immigration was a madhouse, and I missed the second.
They booked me into a hotel room without a bed or shower.
I’ve revised my threat model
DevSecOps @ElizAyer
Why do threat modeling? (OWASP)
● Build a secure design
● Efficient investment of resources; appropriately prioritize security,
development, and other tasks
● Bring Security and Development together to collaborate on a shared
understanding, informing development of the system
● Identify threats and compliance requirements, and evaluate their risk
● Define and build required controls.
● Balance risks, controls, and usability
● Identify where building a control is unnecessary, based on acceptable risk
● Identification of security test cases / security test scenarios to test the
security requirements
https://www.owasp.org/index.php/Application_Threat_Modeling (abridged)
Identify & prioritize security improvements
https://tech.gsa.gov/guides/dev_sec_ops_guide/
Identify & prioritize security improvements
Identify & prioritize security improvements
Case study:
DevOps and Security on
a Small Team by Aidan
Feldman, 18F
In Summary...
To fully realize the joint benefits of speed and
reliability, Security/Compliance must be brought into
DevOps…
In Summary...
Incorporating Security is primarily a people activity.
Threat modelling helps develop a shared language
and set of concerns...
In Summary...
But Security is typically severely underresourced
compared to Development, so we can’t use the same
team structures. We need:
1) Basic dev team security education
2) Dev team access to expertise
3) Enough security capacity to engage
… which generally requires Senior Management Support!
In Summary...
Automation helps scale security.
You’ll get the most out of your tools investment by
prioritizing according to your threat model, involving
Security and Product.
DevSecOps @ElizAyer
DevSecOps is...
Development + Security + Operations =
Safer Software Sooner
DevSecOps @ElizAyer
Resources!
DevSecOps: The Missing Link in Delivering on the Promise
of Business Velocity (Webinar feat. @realgenekim
@wickett)
https://xebialabs.com/community/webinars/devsecops-missing-li
nk-of-business-velocity/
The Open Web Application Security Project
https://www.owasp.org/
GSA DevSecOps Guide https://tech.gsa.gov/guides/dev_sec_ops_guide/
Agile Application Security (Book)
https://www.oreilly.com/library/view/agile-application-security/9781491938836/
Discussion

More Related Content

What's hot

DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...Mohamed Nizzad
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation JourneyDevOps Indonesia
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsPriyanka Aash
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018Sonatype
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and OpportunitiesMohammed A. Imran
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby StepsPriyanka Aash
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat ModelingEC-Council
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introductionStefan Streichsbier
 
Slide DevSecOps Microservices
Slide DevSecOps Microservices Slide DevSecOps Microservices
Slide DevSecOps Microservices Hendri Karisma
 
모의해킹 전문가 되기
모의해킹 전문가 되기모의해킹 전문가 되기
모의해킹 전문가 되기Jeremy Bae
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOpsCYBRIC
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left SecurityBATbern
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityAlert Logic
 
DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..Siddharth Joshi
 

What's hot (20)

DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Dos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOpsDos and Don'ts of DevSecOps
Dos and Don'ts of DevSecOps
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
 
DevSecOps Singapore introduction
DevSecOps Singapore introductionDevSecOps Singapore introduction
DevSecOps Singapore introduction
 
Slide DevSecOps Microservices
Slide DevSecOps Microservices Slide DevSecOps Microservices
Slide DevSecOps Microservices
 
모의해킹 전문가 되기
모의해킹 전문가 되기모의해킹 전문가 되기
모의해킹 전문가 되기
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..DevOps to DevSecOps Journey..
DevOps to DevSecOps Journey..
 

Similar to DevSecOps at Agile 2019

The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009Security Ninja
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Deliverydevopsdaysaustin
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySeniorStoryteller
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdfEnov8
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybSeniorStoryteller
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityVodqaBLR
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"Aaron Rinehart
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applicationsMagno Logan
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseJames Wickett
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6Dinis Cruz
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsJames Wickett
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessMohammed A. Imran
 

Similar to DevSecOps at Agile 2019 (20)

The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg Gryb
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibility
 
Defining DevSecOps
Defining DevSecOpsDefining DevSecOps
Defining DevSecOps
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applications
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
 

More from Elizabeth Ayer

Too many cooks or not enough kitchens?
Too many cooks or not enough kitchens?Too many cooks or not enough kitchens?
Too many cooks or not enough kitchens?Elizabeth Ayer
 
Remote work a year on (FCW)
Remote work a year on (FCW)Remote work a year on (FCW)
Remote work a year on (FCW)Elizabeth Ayer
 
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)Elizabeth Ayer
 
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous DeliveryFlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous DeliveryElizabeth Ayer
 
Continuous Product Management (Industry 2019)
Continuous Product Management (Industry 2019)Continuous Product Management (Industry 2019)
Continuous Product Management (Industry 2019)Elizabeth Ayer
 
The A-word Agile and Beyond 2019
The A-word   Agile and Beyond 2019The A-word   Agile and Beyond 2019
The A-word Agile and Beyond 2019Elizabeth Ayer
 
Uncle Sam's Recipe (Mile High Agile)
Uncle Sam's Recipe (Mile High Agile)Uncle Sam's Recipe (Mile High Agile)
Uncle Sam's Recipe (Mile High Agile)Elizabeth Ayer
 
Aitc2018 ux impact - elizabeth ayer
Aitc2018   ux impact - elizabeth ayer Aitc2018   ux impact - elizabeth ayer
Aitc2018 ux impact - elizabeth ayer Elizabeth Ayer
 
ABCDs of Database Development
ABCDs of Database DevelopmentABCDs of Database Development
ABCDs of Database DevelopmentElizabeth Ayer
 
Zen and the Art of Continuous Delivery - Elizabeth Ayer
Zen and the Art of Continuous Delivery - Elizabeth AyerZen and the Art of Continuous Delivery - Elizabeth Ayer
Zen and the Art of Continuous Delivery - Elizabeth AyerElizabeth Ayer
 

More from Elizabeth Ayer (12)

Too many cooks or not enough kitchens?
Too many cooks or not enough kitchens?Too many cooks or not enough kitchens?
Too many cooks or not enough kitchens?
 
Ethics of Influence
Ethics of InfluenceEthics of Influence
Ethics of Influence
 
Remote work a year on (FCW)
Remote work a year on (FCW)Remote work a year on (FCW)
Remote work a year on (FCW)
 
Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote Teams
 
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
 
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous DeliveryFlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
 
Continuous Product Management (Industry 2019)
Continuous Product Management (Industry 2019)Continuous Product Management (Industry 2019)
Continuous Product Management (Industry 2019)
 
The A-word Agile and Beyond 2019
The A-word   Agile and Beyond 2019The A-word   Agile and Beyond 2019
The A-word Agile and Beyond 2019
 
Uncle Sam's Recipe (Mile High Agile)
Uncle Sam's Recipe (Mile High Agile)Uncle Sam's Recipe (Mile High Agile)
Uncle Sam's Recipe (Mile High Agile)
 
Aitc2018 ux impact - elizabeth ayer
Aitc2018   ux impact - elizabeth ayer Aitc2018   ux impact - elizabeth ayer
Aitc2018 ux impact - elizabeth ayer
 
ABCDs of Database Development
ABCDs of Database DevelopmentABCDs of Database Development
ABCDs of Database Development
 
Zen and the Art of Continuous Delivery - Elizabeth Ayer
Zen and the Art of Continuous Delivery - Elizabeth AyerZen and the Art of Continuous Delivery - Elizabeth Ayer
Zen and the Art of Continuous Delivery - Elizabeth Ayer
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

DevSecOps at Agile 2019