Loading…
Basel, Switzerland
October 10–11, 2018
Click Here For Information & Registration
Back To Schedule
Thursday, October 11 • 11:15 - 11:45
Shift Left Security — The What, Why and How - Ashley Ward, Twistlock

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Today, developers have numerous tools to choose from and methods to consider when building applications and websites. Where 15 years ago working in the cloud was a new trend, today entire companies’ services are born in the cloud. Where virtual machines once reigned, containers are gradually taking their place. How does DevOps adapt to these changes, while still securing their environments, from inception to rollout? One way is to ‘shift left.’

This new approach moves software testing earlier in its lifecycle — or moves left on the project timeline — to prevent defects early in the software delivery process. Ben Bernstein, Chief Executive Officer of Twistlock, will begin this session by giving attendees an in-depth look at what it means to shift left, and will explain the following five steps to ensuring a successful and secure transition to begin testing software earlier in its lifecycle.

Vet configurations: Developers shouldn’t need to make configuration changes. All images, including those used in development and testing stages, should be equal to the images rolled out in production.
Test early and often: Bringing this motto to the shift left approach will help developers measure their success not by how quickly they can get their project into development, but by how many bugs they resolve before rollout.
Give insights into production: Team leads in DevOps should consider building dashboards or visualization tools so developers can gain real-time feedback into the security practices they’re building. This will help security and developer teams join forces to own the security needs in every stage of development.
Rethink automation: Don’t think of automation as a roadblock to production — think of it as a testing gauntlet where the code has to prove itself.
Be proactive: With all the tools today that can detect vulnerabilities and risks, it’s easier than ever to identify and resolve security gaps to prevent being impacted by cyber attacks. Find the right tools, and proactively use them in every stage of the development process.

After discussing these five points, Ben will conclude by discussing the rising role of the developer in stopping attacks before they happen, thereby becoming the behind-the-scenes security guards for company data and customer information.

Speakers
avatar for Ashley Ward

Ashley Ward

Sr. Solution Architect, Twistlock
Ashley Ward is a Solution Architect at Twistlock, where he aids customers in the secure deployment and scaling of container environments. Ashley has over 15 years experience in the operations and infrastructure architect space - from providing Unix administration, scoping private... Read More →


Thursday October 11, 2018 11:15 - 11:45 CEST
San Francisco