Agile + DevOps Virtual 2020 - DevOps Practices
Wednesday, June 10
DevOps, Chapter 2
What do you do after you’ve started adopting DevOps principles? Teams have been embracing DevOps principles to the point that they've become widespread, and now organizations are questioning how they optimize DevOps to realize the value of their investment in this change of culture. An optimized DevOps approach to software delivery is critical as businesses are moving to a new stage of innovation. They are no longer just experimenting with emerging technologies like artificial intelligence—they are embedding them in their business. They are using a mix of container platforms and multi-...
Thursday, June 11
The How and Why of Full-Service Ownership
High-performing software development teams are focused on customers and taking greater ownership of their production stack. The tricky part is teaching these teams how to tackle the operational challenges that come with full-service ownership. Julie Gunderson will discuss how to implement a model where development teams are both empowered to own their full-stack production deployments and equipped to manage common software lifecycle operational issues like reducing alert fatigue and learning from failures.
Agile Fireside Chat
You've got agile and lean questions, and Mary and Tom Poppendieck want to answer them for you. They won't really be sitting by the fire, but they will be on hand to talk about all things lean and agile. Mary has been a programmer, IT manager, and product champion and is well known for the Lean Software Development books that she wrote with her husband, Tom. Tom has been in computing for 25 years, working with health care, logistics, mortgage banking, and travel services, and he holds a Ph.D. in physics. Bring your questions and be ready for a lively, interactive discussion.
DataOps: Eliminating Data Friction in DevOps
The DevOps movement has led to the adoption of continuous integration (CI) and continuous delivery (CD) in the application delivery pipeline. The end goal of establishing a CI/CD pipeline is to achieve a continuous "flow" of releases as new features get built, integrated, tested, and deployed to production-like environments, and eventually to production. This flow depends on the continuous integration and delivery of small batches of code for database and environment changes. Data friction results from the inability to have the right data provisioned to the right environment when it is...
Using Security Chaos Engineering to Build Protected, Resilient Systems
The speed and scale of complex system operations within cloud-driven architectures make them extremely difficult for humans to mentally model their behavior. This often results in unpredictable and catastrophic outcomes that become costly when unexpected security incidents occur. There is a need to realign the actual state of operational security measures in order to maintain an acceptable level of confidence that our security actually works when we need it to. As an alternative to simply reacting to failures, the security industry has been overlooking valuable chances to further...
Lessons Learned Moving to Trunk-Based Development
Moving from a branching model, such as GitFlow, to trunk-based development isn't trivial or easy, but it is definitely worth the effort if increasing release velocity is your goal. Craig Sebenik led the transition to “trunk dev” at a couple of companies after being involved in a massive project at LinkedIn. Join Craig as he describes trunk dev and gives his perspective on the scenarios where the different flavors work best. Discuss what you lose by moving away from a branching model and what you gain with trunk dev, and why that transition will set up the team for future growth and faster...
Thursday, June 25
DevSecOps Summit: So Happy Together: Making the Promise of DevSecOps a Reality
It may be hard for some to believe, but it’s been over a decade since DevOps was first introduced. It wasn’t very long after that the concept of DevSecOps began to emerge as security practitioners attempted to keep application security practices engaged in software delivery. However, recent surveys show that even in organizations that have adopted a DevSecOps model, security is still often viewed as a bottleneck. This idea of security as an inhibitor can undermine the promise of DevSecOps to deliver a culture of shared responsibility for security. Hacker, former developer, and application...
DevSecOps Summit: AppSec: Grim Reaper or Archangel of Dev?
AppSec has gotten a bad rap as the “no” team, having to bear the bad news of why Development can’t deploy. But it’s not their fault—without effective integration of AppSec into the SDLC, both teams suffer from untimely information, which means AppSec can only deliver bad news, not enable security as a health part of a Development process. With an effective SecDevOps program that includes proactive policy assignment to effectively manage security debt and automate governance, Security shifts from being a blocker to an advisor in decreasing project delivery risk, without sacrificing velocity...
DevSecOps Summit: Embracing DevSecOps through Embedded Application Security
Traditional approaches to application security create unacceptable drag and scaling problems for DevOps, while expert staffing and tooling requirements to support “more code, faster” create untenable economics. This presentation will discuss the transformative impact of embedding application security into applications themselves. Embedded AppSec removes friction, enables security to be seamlessly woven into DevOps, and provides a continuous and unified approach across the SDLC that empowers Dev, Security, QA/Test, Ops, and other stakeholders to collaborate and realize the benefits of...
DevSecOps Summit: Risk Management and Audit in a High Change Environment
When you are trying to move fast and ship to customers you don't want risk and compliance holding you back. But the environment that we work in requires you to have good risk management and we all have compliance obligations that we need to maintain. So how do we make this work? At Atlassian, we are always trying to ship faster to meet your needs and we have lots of compliance obligations to maintain - come and hear from Guy Herbert, Atlassian's Risk Futurist about how the combination of people, practices, and tools has enabled teams to ship multiple times per day to regulated compliance...
Friday, June 26
DevSecOps Summit: Blameless Retrospectives in DevSecOps at Global Healthcare Giants
Implementing a scalable DevOps program can seem like an impossible task at times. Add security into the mix and the challenge can appear insurmountable. Organizations around the world have come to realize the potential business impacts of adopting DevSecOps and how it can enable engineers to deliver more value to the market faster. While the prospect of transformation seems alluring, a great number of organizations are still unsure of where to start, what’s involved, how much it will cost and how to achieve success. Discussing our triumphs and tragedies not only bring clarity, but champion...
DevSecOps: Essential Pipeline Tooling To Enable Continuous Security
As we embrace DevOps to optimize our Agility, we need to move away from slow, manually intensive processes into more of a continuous flow of software into production. Whether we are doing true "Continuous Deployment" straight to production or not, we no longer have time for slow, manual, late-lifecycle security assessments to determine if our code is going to put us on the front page of the newspaper (for the wrong reasons). What we need is the visibility to know that our code is secure enough to pass muster every day. What we need is continuous security.
The DevSecOps movement is...
DevSecOps Summit: Continuous QA Risk Analysis with an AppSec-DevOps-OWASP Mindset!
PreviewThe scope and complexities of Application Security testing in a DevOps world are rapidly increasing as new technologies emerge, applications become more advanced, vulnerabilities more prevalent, and threats become more astute! The quantity and types of vulnerabilities can make the process of testing overwhelming, especially in a DevOps and Agile world when factoring in aggressive target dates and a lack of resources. Utilizing a rapid, strategic risk-based analysis approach while factoring in the OWASP Top 10 will assist you in prioritizing your overall testing effort. If you can’t...