Recorded March 2, 2020 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Interview: Dan Petit, InfoSec World Speaker
Dan Petit has been deep in the development world for most of his working life, serving as a developer, consultant, architect, and technical leader for a wide-variety of companies in the aerospace, telecommunications, insurance, hospitality, logistics, and service industries. Throughout his career, Dan and his teams have been responsible for large-scale DevOps adoption and transformations, reducing cycle time of application changes from weeks to hours across dozens of agile development teams. He is currently Principal DevOps Architect for Hilton. He authored the book Real Visual Basic and numerous technical articles, and teaches a two-day “deep dive” DevSecOps workshop for the FedEx Institute of Technology at the University of Memphis.
InfoSec World Workshop: DevSecOps and Cultural Transformation
Discussion of my upcoming 2-day workshop at InfoSec World. The workshop is a "deep survey" into all things DevSecOps.
The DevSecOps movement seeks to resolve competing objectives by creating truly cross-functional teams that are empowered to do everything involved with creating and operating software without involving other teams. This is achieved through extensive automation of most manual tasks. However, implementing DevSecOps goes far beyond tools and processes. It is a cultural change involving most aspects of software development. This two-day workshop explores what “DevSecOps” means in practice, with particular emphasis on leading the transformation from a traditional software development/support mindset to one supported by DevSecOps principles.
- Why DevSecOps is important and its place in an Agile context?
- How to get started with the transformation, along with its impact on culture and organization?
- How to design and implement DevSecOps pipelines as a framework for automation?
- Driving high quality and faster turnaround through Automated Testing?
- Reducing cycle time with Continuous Integration and Continuous Delivery?
- How to measure progress and success in the transformation
- Driving operational transformation through Infrastructure As Code concepts
- Impact of DevSecOps on systems architecture and development processes
- How DevSecOps affects Security and Compliance?
Flaws, Breaches & Threats
- CVE-2020-1938: Ghostcat vulnerability in the Tomcat Apache JServ Protocol.
- IMP4GT: IMPersonation Attacks in 4G NeTworks demonstrates a proven insecurity on a layer above provably secure protocol.
Cloud, Code & Controls
- Boeing implementing more rigorous testing of Starliner after software problems shows how problems in cloud computing will be just the same in star systems.
- APIs are becoming a major target for credential stuffing attacks and don't have to target the login workflow.
Learning & Tools
Food for Thought
- SSL/TLS certificate validity chopped down to one year by Apple’s Safari and how this can drive secure DevOps behaviors.
- 5 key areas for tech leaders to watch in 2020