How to Build a DevOps Supply Chain on Zero-Trust Principles

Logo
Presented by

ESG Sr. Analyst, Melinda Marks; Check Point Security Engineer Lead, Bisham Kishnani & Developer Security Lead, Dotan Nahum

About this talk

Over the past decade, the concept of Zero Trust has become a fundamental part of cybersecurity architecture. In fact, the concept of Zero Trust is behind most common network security policies, which require continuous and explicit validation, use least privilege access controls, and assume that a breach could have already occurred and we are simply not yet aware of it. Zero Trust has been fundamental in securing enterprise networks from cyber attackers. However, in recent years, cyber attackers are turning their attention away from network based attacks to finding code based vulnerabilities. In this talk series we will discuss how Zero Trust principles, applied so effectively to enterprise network security, can also be applied to continuously protecting the Software Development Lifecycle from would-be attackers. Session Topics Include: "Walking the Line: GitOps and Shift Left Security" with Melinda Marks, Sr. Analyst at ESG "Building a DevOps Supply Chain on Zero Trust Principles" with Bisham Kishnani, Head of Cloud Security Engineering at Check Point Software Technologies "Practitioners Discussion on Developer First Security" with Dotan Nahum, Head of Developer Security at Check Point Software Technologies
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (367)
Subscribers (55687)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.