SlideShare a Scribd company logo
Shift Left Security? Development
Does Not Want to Own It.
Shlomo Bielak George Davis
With: With:
TO USE YOUR COMPUTER'S AUDIO:
When the webinar begins, you will be connected to audio using
your computer's microphone and speakers (VoIP). A headset is
recommended.
Webinar will begin:
11:00 am, PST
TO USE YOUR TELEPHONE:
If you prefer to use your phone, you must select "Use Telephone"
after joining the webinar and call in using the numbers below.
United States: +1 (213) 929-4212
Access Code: 255-485-743
Audio PIN: Shown after joining the webinar
--OR--
2
For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for
exchanging digital information. Security is our entire focus, and it shows. This single-minded
passion has inspired our innovations that keep up with the bad guys despite a changing IT
landscape, riskier user behavior, and constantly evolving threats.
The depth of our experience remains unmatched. From the endpoint to the network to the
cloud, we’ve got you covered with a connected threat defense recognized by analysts,
customers, and industry gurus of all kinds. Our seamless protection for your mission-critical
environments doesn’t just happen. We have developed deep relationships and partnered with
industry leaders that you can trust. Our security is optimized for leading environments,
platforms, and applications that are needed to maximize protection and performance.
3
Click on the Questions panel to
interact with the presenters
https://www.informationmanagementtoday.com/frs/14625244/shift-left-security--
development-does-not-want-to-own-it-
4
About Shlomo Bielak
Shlomo, Benchmark Corp’s CTO is building expertise to shift global markets in understanding how to
make a transformational initiative scale without heroics. His experience and thought leadership
coupled with his talented engineering effectiveness department are creating never-before-seen
solutions for Multi-Cloud, DevOps, DevSecOps, and enabling continuous deployment to production for
the enterprise. A rich and responsive customer experience.
About George Davis
George is a DevOps and Cloud expert at Trend Micro. He works closely with Trend Micro’s
customers and partners to build layers of security into every step of their CI/CD pipeline. His
experience working in Dev, Test, Ops and Security helps customers to connect the dots, deliver
continuously, and iterate often while maintaining a healthy security posture. He primarily
focuses on Cloud One - Trend Micro's Security Services platform for the Cloud, securing
application runtime, container/server/serverless workloads and overall, better management of
governance, risk and compliance in the Cloud.
Applying Shift Left
Go Tri-Centric
George Davis – Trend
Shlomo Bielak – Benchmark Corp
Benchmark Confidential
THIS IS COMPLEX & FAILS
BUY ANOTHER COMPANY -
HARDER
THIS IS FUN
Dev-Centric Works!
ENTERPRISE
Sell ‘X’ to customers
STARTUP
Sell ‘X’ to customers
DELIVER CODE
FAST – CHANGE
NPS
Brand
SLA
Regulatory
/ Security
Code
drop
Code
drop
Code
drop
Code
drop
DELIVER CODE
FAST – CHANGE
Realities of Shift-Left
POC
POV
LAB
SUSTAIN
&
SCALE
7
DESIRE:
Commit Code
CORE COMPETENCY:
Coding
DESIRE:
Confident Steward of Prod
CORE COMPETENCY:
Operational Excellence
DESIRE:
Risk Managed
CORE COMPETENCY:
Governance
Developer / DevOps SRE / OPS Security Expert
Enterprise Personas - Today’s Approach?
8
THIS REQUIRES
SOLDIERS OF
FORTUNE
THE INTERACTION
MODEL IS
THREATENING
THE INTERACTION
MODEL IS POOR
Making Dev Own
Security/Ops
Requirements
Operations Does
Not Feel Valued
Security Is Seen As
Slowing Down Dev
Dev-Centric Shift left
RESPONSIBILITY ACCOUNTABILITY ACCOUNTABILITY
Security Is More Than Code
REVIEWING COMMON IT
SECURITY FRAMEWORKS
ISO
NIST
FEDRAMP
FISMA
PCI
CIS
Completed
with Code
√
Requires
Education
√
Requires
Audit
Process
Focus
Incident
Focused
√
√
√
√
√
√ √
√
√
√
√
√
SDLC
Component
√
√
√
√√
√
√
GOVERNANCE
ENGINEERING
MEASURE CX
RESPONSIVENESS
MODEL
GOVERNANCE
ENGINEERING
MEASURE CX
RESPONSIVENESS
MODEL
DeploymentPipeline
If(is_array($v[?]))
IN PRACTICE
Orchestration Pipeline – CI/CD
Governance Standards – Checking Tags and Values = KPI per service
Dev Workflow QA Workflow Staging Workflow Prod Workflow
Task Task Task Task Task Task Task Task
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
LAYERS OF PIPELINE GOVERNANCE STANDARDS
Regulatory (i.e. PCI)
Criticality or Service Tier (i.e. Platinum)
Quality (i.e. Code)
Stage (i.e. Development)
Target (i.e. Cloud Provider)
OUTPUT
KPIs – Compliance % per service
Auditability
Customer Loyalty /
Brand Quality /
Cost Savings
Human Toll (i.e. Fire fighting hours) Talent pool development
Security
In Practice
Pipeline Tasks
LAYERS OF PIPELINE TASKS
Measure – Integration
Pipeline Standards – Identify Tech Debt
Over time – Maturity & Standards Improve
Measure - Output
Unique Per Stage
Gate or Threshold or Track
Continuous Improvement of Standards
1 2
Evaluate - Release to Release Delta Values – Not starting value
Better Worse
13
THIS REQUIRES
COLLABORATION
THE INTERACTION
MODEL IS
INVOLVEMENT
THE INTERACTION
MODEL IS
RESPONSIVE
MAKING DEV OWN
CODE AGAIN
OPERATIONS HANDLES
DIFFICULT PRESSURES
- REDUCE WITH CODING
SECURITY BRINGS THEIR
BALLIWICK – MEASURE
CONFORMANCE AND FITNESS
Tri-Centric Shift Left – Governance Engineering
Operating Model
14
Q&A
George Davis
With: With:
CTO, Benchmark Corp.
Linkedin: in/ciscoconsultant
Website: benchmarkcorp.com
Shlomo Bielak
Sales Engineer, Trend Micro
Linkedin page: /in/georgedavisc/
Website: https://gdcrocx.github.io/
https://www.informationmanagementtoday.com/frs/14625244/shift-left-security--development-does-not-want-
to-own-it-
Thank you!

More Related Content

What's hot

Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
Devops certification training course
Devops certification training courseDevops certification training course
Devops certification training course
NamnaChheda1
 
Devops certification training course
Devops certification training course Devops certification training course
Devops certification training course
NamnaChheda1
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
Sebastien Deleersnyder
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Digital Transformation EXPO Event Series
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
Shawn Wells
 
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspectiveHow to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
Preforce Slideshare Proof
Preforce Slideshare ProofPreforce Slideshare Proof
Preforce Slideshare Proof
Eric Hollinshead
 
Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security
Sebastien Deleersnyder
 
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
SlideTeam
 
Lessons from a recovering runtime application self protection addict
Lessons from a recovering runtime application self protection addictLessons from a recovering runtime application self protection addict
Lessons from a recovering runtime application self protection addict
Priyanka Aash
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021 TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
Sprintzeal
 
Ritam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unixRitam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unix
RItam Bose
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
Checkmarx
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
Synopsys Software Integrity Group
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021
Sprintzeal
 
Industry 4.0 and security
Industry 4.0 and securityIndustry 4.0 and security
Industry 4.0 and security
Denis Jakuzza
 

What's hot (20)

Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Devops certification training course
Devops certification training courseDevops certification training course
Devops certification training course
 
Devops certification training course
Devops certification training course Devops certification training course
Devops certification training course
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspectiveHow to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Preforce Slideshare Proof
Preforce Slideshare ProofPreforce Slideshare Proof
Preforce Slideshare Proof
 
Use our Threat Modeling Playbook to Improve your Product Security
Use our Threat Modeling Playbookto Improve your Product Security Use our Threat Modeling Playbookto Improve your Product Security
Use our Threat Modeling Playbook to Improve your Product Security
 
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
 
Lessons from a recovering runtime application self protection addict
Lessons from a recovering runtime application self protection addictLessons from a recovering runtime application self protection addict
Lessons from a recovering runtime application self protection addict
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021 TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
 
Ritam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unixRitam Bose_Webspheresupport_unix
Ritam Bose_Webspheresupport_unix
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021HOW TO BECOME A RELEASE MANAGER IN 2021
HOW TO BECOME A RELEASE MANAGER IN 2021
 
Industry 4.0 and security
Industry 4.0 and securityIndustry 4.0 and security
Industry 4.0 and security
 

Similar to Shift Left Security: Development Does Not Want to Own It.

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....
Eturnti Consulting Pvt Ltd
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
Savinder Puri
 
Ambesh
AmbeshAmbesh
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
Grant Ongers
 
Resume
ResumeResume
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
Elasticsearch
 
Stu r35 a
Stu r35 aStu r35 a
Operational security engineer architect
Operational security engineer architectOperational security engineer architect
Operational security engineer architect
Mark Long
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
Iwan Setiawan
 
The Teams Behind DevSecOps
The Teams Behind DevSecOps The Teams Behind DevSecOps
The Teams Behind DevSecOps
Uleska
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
Product Security
Product SecurityProduct Security
Product Security
Steven Carlson
 
Template 30
Template 30Template 30
Template 30
scottsloan74
 

Similar to Shift Left Security: Development Does Not Want to Own It. (20)

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Ambesh
AmbeshAmbesh
Ambesh
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
 
Resume
ResumeResume
Resume
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Stu r35 a
Stu r35 aStu r35 a
Stu r35 a
 
Operational security engineer architect
Operational security engineer architectOperational security engineer architect
Operational security engineer architect
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
 
The Teams Behind DevSecOps
The Teams Behind DevSecOps The Teams Behind DevSecOps
The Teams Behind DevSecOps
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
Product Security
Product SecurityProduct Security
Product Security
 
Template 30
Template 30Template 30
Template 30
 

More from Aggregage

How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
Aggregage
 
Secrets of a Successful Sale: Optimizing Your Checkout Process
Secrets of a Successful Sale: Optimizing Your Checkout ProcessSecrets of a Successful Sale: Optimizing Your Checkout Process
Secrets of a Successful Sale: Optimizing Your Checkout Process
Aggregage
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
Aggregage
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Unlocking Employee Potential with the Power of Continuous Feedback
Unlocking Employee Potential with the Power of Continuous FeedbackUnlocking Employee Potential with the Power of Continuous Feedback
Unlocking Employee Potential with the Power of Continuous Feedback
Aggregage
 
The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...
The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...
The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...
Aggregage
 
From Awareness to Action: An HR Guide to Making Accessibility Accessible
From Awareness to Action:  An HR Guide to Making Accessibility AccessibleFrom Awareness to Action:  An HR Guide to Making Accessibility Accessible
From Awareness to Action: An HR Guide to Making Accessibility Accessible
Aggregage
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
Aggregage
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
Aggregage
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Aggregage
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
Aggregage
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
Aggregage
 
Planning your Restaurant's Path to Profitability
Planning your Restaurant's Path to ProfitabilityPlanning your Restaurant's Path to Profitability
Planning your Restaurant's Path to Profitability
Aggregage
 
The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance Culture
Aggregage
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
Aggregage
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Aggregage
 
The Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
The Retention Ripple Effect: Nonprofit Staff and Donor DynamicsThe Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
The Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
Aggregage
 
Breaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for ExcellenceBreaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for Excellence
Aggregage
 

More from Aggregage (20)

How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
 
Secrets of a Successful Sale: Optimizing Your Checkout Process
Secrets of a Successful Sale: Optimizing Your Checkout ProcessSecrets of a Successful Sale: Optimizing Your Checkout Process
Secrets of a Successful Sale: Optimizing Your Checkout Process
 
The Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR ComplianceThe Rules Do Apply: Navigating HR Compliance
The Rules Do Apply: Navigating HR Compliance
 
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Unlocking Employee Potential with the Power of Continuous Feedback
Unlocking Employee Potential with the Power of Continuous FeedbackUnlocking Employee Potential with the Power of Continuous Feedback
Unlocking Employee Potential with the Power of Continuous Feedback
 
The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...
The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...
The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufa...
 
From Awareness to Action: An HR Guide to Making Accessibility Accessible
From Awareness to Action:  An HR Guide to Making Accessibility AccessibleFrom Awareness to Action:  An HR Guide to Making Accessibility Accessible
From Awareness to Action: An HR Guide to Making Accessibility Accessible
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Planning your Restaurant's Path to Profitability
Planning your Restaurant's Path to ProfitabilityPlanning your Restaurant's Path to Profitability
Planning your Restaurant's Path to Profitability
 
The Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance CultureThe Engagement Engine: Strategies for Building a High-Performance Culture
The Engagement Engine: Strategies for Building a High-Performance Culture
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
The Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
The Retention Ripple Effect: Nonprofit Staff and Donor DynamicsThe Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
The Retention Ripple Effect: Nonprofit Staff and Donor Dynamics
 
Breaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for ExcellenceBreaking the Burnout Cycle: Empowering Managers for Excellence
Breaking the Burnout Cycle: Empowering Managers for Excellence
 

Recently uploaded

What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 

Recently uploaded (20)

What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 

Shift Left Security: Development Does Not Want to Own It.

  • 1. Shift Left Security? Development Does Not Want to Own It. Shlomo Bielak George Davis With: With: TO USE YOUR COMPUTER'S AUDIO: When the webinar begins, you will be connected to audio using your computer's microphone and speakers (VoIP). A headset is recommended. Webinar will begin: 11:00 am, PST TO USE YOUR TELEPHONE: If you prefer to use your phone, you must select "Use Telephone" after joining the webinar and call in using the numbers below. United States: +1 (213) 929-4212 Access Code: 255-485-743 Audio PIN: Shown after joining the webinar --OR--
  • 2. 2 For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats. The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds. Our seamless protection for your mission-critical environments doesn’t just happen. We have developed deep relationships and partnered with industry leaders that you can trust. Our security is optimized for leading environments, platforms, and applications that are needed to maximize protection and performance.
  • 3. 3 Click on the Questions panel to interact with the presenters https://www.informationmanagementtoday.com/frs/14625244/shift-left-security-- development-does-not-want-to-own-it-
  • 4. 4 About Shlomo Bielak Shlomo, Benchmark Corp’s CTO is building expertise to shift global markets in understanding how to make a transformational initiative scale without heroics. His experience and thought leadership coupled with his talented engineering effectiveness department are creating never-before-seen solutions for Multi-Cloud, DevOps, DevSecOps, and enabling continuous deployment to production for the enterprise. A rich and responsive customer experience. About George Davis George is a DevOps and Cloud expert at Trend Micro. He works closely with Trend Micro’s customers and partners to build layers of security into every step of their CI/CD pipeline. His experience working in Dev, Test, Ops and Security helps customers to connect the dots, deliver continuously, and iterate often while maintaining a healthy security posture. He primarily focuses on Cloud One - Trend Micro's Security Services platform for the Cloud, securing application runtime, container/server/serverless workloads and overall, better management of governance, risk and compliance in the Cloud.
  • 5. Applying Shift Left Go Tri-Centric George Davis – Trend Shlomo Bielak – Benchmark Corp Benchmark Confidential
  • 6. THIS IS COMPLEX & FAILS BUY ANOTHER COMPANY - HARDER THIS IS FUN Dev-Centric Works! ENTERPRISE Sell ‘X’ to customers STARTUP Sell ‘X’ to customers DELIVER CODE FAST – CHANGE NPS Brand SLA Regulatory / Security Code drop Code drop Code drop Code drop DELIVER CODE FAST – CHANGE Realities of Shift-Left POC POV LAB SUSTAIN & SCALE
  • 7. 7 DESIRE: Commit Code CORE COMPETENCY: Coding DESIRE: Confident Steward of Prod CORE COMPETENCY: Operational Excellence DESIRE: Risk Managed CORE COMPETENCY: Governance Developer / DevOps SRE / OPS Security Expert Enterprise Personas - Today’s Approach?
  • 8. 8 THIS REQUIRES SOLDIERS OF FORTUNE THE INTERACTION MODEL IS THREATENING THE INTERACTION MODEL IS POOR Making Dev Own Security/Ops Requirements Operations Does Not Feel Valued Security Is Seen As Slowing Down Dev Dev-Centric Shift left RESPONSIBILITY ACCOUNTABILITY ACCOUNTABILITY
  • 9. Security Is More Than Code REVIEWING COMMON IT SECURITY FRAMEWORKS ISO NIST FEDRAMP FISMA PCI CIS Completed with Code √ Requires Education √ Requires Audit Process Focus Incident Focused √ √ √ √ √ √ √ √ √ √ √ √ SDLC Component √ √ √ √√ √ √
  • 11. GOVERNANCE ENGINEERING MEASURE CX RESPONSIVENESS MODEL DeploymentPipeline If(is_array($v[?])) IN PRACTICE Orchestration Pipeline – CI/CD Governance Standards – Checking Tags and Values = KPI per service Dev Workflow QA Workflow Staging Workflow Prod Workflow Task Task Task Task Task Task Task Task Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value LAYERS OF PIPELINE GOVERNANCE STANDARDS Regulatory (i.e. PCI) Criticality or Service Tier (i.e. Platinum) Quality (i.e. Code) Stage (i.e. Development) Target (i.e. Cloud Provider) OUTPUT KPIs – Compliance % per service Auditability Customer Loyalty / Brand Quality / Cost Savings Human Toll (i.e. Fire fighting hours) Talent pool development
  • 12. Security In Practice Pipeline Tasks LAYERS OF PIPELINE TASKS Measure – Integration Pipeline Standards – Identify Tech Debt Over time – Maturity & Standards Improve Measure - Output Unique Per Stage Gate or Threshold or Track Continuous Improvement of Standards 1 2 Evaluate - Release to Release Delta Values – Not starting value Better Worse
  • 13. 13 THIS REQUIRES COLLABORATION THE INTERACTION MODEL IS INVOLVEMENT THE INTERACTION MODEL IS RESPONSIVE MAKING DEV OWN CODE AGAIN OPERATIONS HANDLES DIFFICULT PRESSURES - REDUCE WITH CODING SECURITY BRINGS THEIR BALLIWICK – MEASURE CONFORMANCE AND FITNESS Tri-Centric Shift Left – Governance Engineering Operating Model
  • 14. 14 Q&A George Davis With: With: CTO, Benchmark Corp. Linkedin: in/ciscoconsultant Website: benchmarkcorp.com Shlomo Bielak Sales Engineer, Trend Micro Linkedin page: /in/georgedavisc/ Website: https://gdcrocx.github.io/ https://www.informationmanagementtoday.com/frs/14625244/shift-left-security--development-does-not-want- to-own-it-