Conference: Jun 13-15, 2016
Tutorials: Jun 16-17, 2016
Presentation: Here Be Dragons: Security Maps of the Container New World
Location:
- Salon A/B
Day of week:
- Friday
Containers are changing the software development landscape and accelerating the adoption of DevOps. Containers are deployed rapidly, form a loosely connected network, and are often ephemeral. In the hands of a skilled DevOps professional, these tools are producing tremendous value by delivering functionality at break neck speed. From the perspective of the CISOs office, these new systems are terrifying and need to brought under control quickly or stopped altogether. Attempts to use traditional security tools and methods to orchestrate security for networks of containers are woefully inadequate. This presentation will explore some of the unique security challenges created by both the development workflow and application runtime, explain why and how the current approaches - SecDevOps 1.0 are insufficient, and explain how SecDevOps 2.0 techniques including Software Defined Firewalls (SDF) provide a promising path forward for all parties involved.
(Don’t worry, the new world isn’t flat and you won’t fall off!)
Josh Bregman Elsewhere
Similar Talks
Tracks
Wednesday Jun 10
-
Applied Data Science and Machine Learning
Putting your data to use. The latest production methods for deriving novel insights
-
Engineer Your Culture
Building and scaling a compelling engineering culture
-
Modern Advances in Java Technology
Tips, techniques and technologies at the cutting edge of modern Java
-
Monoliths to Microservices
How to evolve beyond a monolithic system -- successful migration and implementation stories
-
The Art of Software Design
Software Arch as a craft, scenario based examples and general guidance
-
Sponsored Solutions Track I
Thursday Jun 11
-
Emerging Technologies in Front-end Development
The state of the art in client-side web development
-
Fraud Detection and Hack Prevention
Businesses are built around trust in systems and data. Securing systems and fighting fraud throughout the data in them.
-
Reactive Architecture Tactics
The how of the Reactive movement: Release It! techniques, Rx, Failure Concepts, Throughput, Availability
-
Architecting for Failure
War stories and lessons learned from building highly robust and resilient systems
-
High Performance Streaming Data
Scalable architectures and high-performance frameworks for immediate data over persistent connections
-
Sponsored Solutions Track II
Friday Jun 12
-
Architectures You've Always Wondered about
Learn from the architectures powering some of the most popular applications and sites
-
Continuously Deploying Containers in Production
Production ready patterns for growing containerization in your environment
-
Mobile and IoT at Scale
Users, Usage and Microservices
-
Modern Computer Science in the Real World
How modern CS tackles problems in the real world
-
Optimizing Yourself
Maximizing your impact as an engineer, as a leader, and as a person
-
Sponsored Solutions Track III