45+ InfoSec Courses at SANS Network Security 2018 in Las Vegas! Save up to $200 thru 8/22.

Secure DevOps Summit & Training

Denver, CO | Mon, Oct 22 - Mon, Oct 29, 2018
Event starts in 63 Days
 

Summit Agenda

Summit Agenda

We strive to present the most relevant, timely and valuable content. As a result, this agenda is subject to change. Please check back frequently for changes and updates. The following talks and speakers have been confirmed for SANS Secure DevOps Summit 2018:

Keynote: Fast Forward: Reflecting on a Life Watching Movies and a Career in Security

Things change, and people and industries adapt. Individuals and businesses that can spot the trends and adjust quickly are likely to be more successful. With this as an underlying thesis, we'll talk about some trends in the movie industry that relate well to similar changes in technology and security. We'll also run through some tips and lessons learned to help security teams stay ahead as they navigate technical and operational changes.

Jason Chan @chanjbs, VP – Cloud Security, Netflix


Serverless Security: Your Code, Your Responsibility

In serverless, the cloud provider is responsible for securing the underlying infrastructure, from the data centers all the way up to the container and runtime environment. This relieves much of the security burden from the application owner, however it also poses many unique challenges when it comes to securing the application layer. In this presentation, we will discuss the most critical challenges related to securing serverless applications - from development to deployment. We will also walk through a live demo of a realistic serverless application that contains several common vulnerabilities, and see how they can be exploited by attackers, and how to secure them.

Ory Segal, CTO, PureSec


Moving Fast & Securing Things

“Process” is often seen as an antithetical to the fast-moving nature of startups; security processes, in particular, can be regarded as a direct impediment to shipping cool features. On the other hand, the security of an organization and its users shouldn’t be disregarded for the sake of speed. Striking a balance between security and nimble development is a vital aspect of an application security team. At Slack, we have implemented a secure development process which has both accelerated development and allowed us to scale our small team to cover the features of a rapidly growing engineering organization.
In this presentation, we will discuss both our Secure Development Lifecycle (SDL) process and tooling, as well as view metrics and provide analysis of how the process has worked thus far. We'll discuss our deployment of a flexible framework for security reviews, including a lightweight self-service assessment tool, a checklist generator, and most importantly a messaging process that meets people where they are already working. We’ll show how it’s possible to encourage a security mindset among developers while avoiding an adversarial relationship. By tracking data from multiple sources, we can also view the quantified success of such an approach and show how it can be applied in other organizations.

Kelly Ann, Security Engineer - Product Security, Slack
Nikki Brandt, Senior Security Engineer - Product Security, Slack


Lessons Learned From Illumina’s SecDevOps Transition

Illumina is a leading developer, manufacturer, and marketer of life science tools and integrated systems for large-scale analysis of genetic variation and function. Ninety percent of all genetic sequencing world-wide is performed on Illumina equipment. The BaseSpace Suite consists of multiple SaaS and PaaS solutions that allow customers to store, analyze, and share the large genetic data sets generated. This talk will share the lessons that Illumina has learned as the company adopts SecDevOps principles while integrating acquisitions and scaling out to serve new geographies.

Kenneth G. Hartman @KennethGHartman, Associate Director, Cloud Security, Illumina; Community Instructor, SANS Institute


Detection as Code: Applying the Software Development Lifecycle to Blue Team Operations

The modern software development lifecycle (SDLC) is the result of decades of evolution to the processes software engineers use to launch and maintain high-quality systems While hunting and detection capabilities of a typical blue team are in their relative infancy compared to the SDLC, important software lessons can be ported to the security operations world to drive a generational leap forward for daily blue team activities.

In this talk, attendees will learn how the SDLC can be brought to the blue team for operationalization to improve the predictability, reliability, and effectiveness of hunting and detection through:

  • Treating detection as code
  • Source controlling detection techniques and alerts with Git
  • Unit testing detection techniques and alerts
  • Using pull requests and peer reviews as change control
  • Continuous integration and continuous delivery to get tested changes into production systems

Brian Beyer, Chief Executive Officer and Co-Founder, Red Canary


Ship of Fools: Shoring up Kubernetes Security

Hackers gonna hack. They have their own motivations, and they don’t care about your constraints. As attackers, they want to find vulnerabilities and exploit them. As a defender, your mission is to stop them. Mistakes can be easy to make, but with the right configuration and attention to security best practices many attacks can be prevented.

This talk will give you practical advice about securing your Kubernetes clusters, from an attacker’s perspective. We’ll walk through the attack process from discovery to post-exploitation, and you’ll walk away with tools and techniques that can be used for prevention along the way. Learn how to keep your infrastructure safer by making a hacker’s job harder.

Ian Coldwater @IanColdwater, DevOps Engineer, Jamf Software