SlideShare a Scribd company logo
1 of 64
Download to read offline
Dev???Ops
The Missing Middle: Security
Elizabeth Ayer
18F - TTS - GSA
@ElizAyer
Agile 2019
DevSecOps @ElizAyer
I am going to show you today how to get more
secure applications delivered faster.
DevSecOps @ElizAyer
But first I am going to tell you how we got less
secure applications delivered more slowly….
Storytime...
DevSecOps @ElizAyer
Key dynamics:
● Everyone had many responsibilities. No matter
what the official priorities, compliance paperwork
came last
● Dev had already damaged trust
● Security was severely underresourced
● Compliance sucked the oxygen from security
● At any point, the director could have made this
happen… but didn’t
DevSecOps @ElizAyer
Truly, everyone did the best job he or she
could, given what was known at the time, his or
her skills and abilities, the resources available,
and the situation at hand.
We could have
been here
But we spent our
time here instead
DevSecOps @ElizAyer
Why bring security into the development
process? [Crowdsourced]
● In any org with formal compliance, ignoring security may mean
delivering late or not at all.
● Can select what controls are important to YOU
○ Can also be platform specific
● Improves security - devs should understand what they might do to
cause a breach. Educate them early.
● Cost of fixing vulnerability is exponential
● Reduces schedule drift - improved flow
● Understand which tools can/can’t be used.
● Task may not be allowed at all
● May need to do major refactoring to incorporate, e.g. encryption
● Platform-level security practices.
● Brand reputation ***
10
DevOps 101
DevSecOps
SEC
v
DevSecOps @ElizAyer
DevOps is...
A combination of philosophies, practices and
tools that increases an organization’s ability to
deliver applications and services at high velocity
- AWS What is DevOps? (Dev Perspective)
DevSecOps @ElizAyer
DevOps is...
[A way to] reduce waste and make releases
boring
- Jez Humble, Author &18F Alumni (Ops perspective)
+Security!
DevSecOps @ElizAyer
DevOps is...
An approach that resolves the apparent conflict
between speed and reliability
Security
fits Here
DevSecOps @ElizAyer
Why isn’t security within the Ops in DevOps?
We call out security separately because:
1) Security is truly a specialist discipline
2) Security got left out of the first wave of DevOps
3) Security is used to encompass compliance, and
that’s definitely not part of DevOps
DevSecOps @ElizAyer
https://slack.engineering/moving-fast-and-securing-things-540e6c5ae58a
DevSecOps @ElizAyer
Why isn’t security within the Ops in DevOps?
We call out security separately because:
1) Security is truly a specialist discipline
2) Security got left out of the first wave of DevOps
3) Security is used to encompass compliance, and
that’s definitely not part of DevOps
DevSecOps @ElizAyerhttps://tech.gsa.gov/guides/dev_sec_ops_guide/
DevSecOps @ElizAyer
DevSecOps is...
Development + Security + Operations =
Safer Software Sooner
DevSecOps @ElizAyer
Digression: Why DevSecOps, not DevOpsSec?
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
One team handles a software system through
inception, delivery, maintenance, end-of-life of a
system.
1. People: the DevOps culture
DevSecOps @ElizAyer
Shared responsibility
for how software behaves in
production
23
Continuous feedback
results in tighter processes
that get better and better
Optimization of the
full system, not just one
piece, department, or interest.
Open communications and
knowledge sharing
enhance trust within the team
1. People: the DevOps culture
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
2. Process: Empowered Teams & Shift Left
An empowered team contains the skills and
authority it needs to develop & operate its systems.
For DevSecOps, the team needs basic security
skills and access to expertise.
DevSecOps @ElizAyer
2. Process: Empowered Teams & Shift Left
“Shift Left” means that operability concerns should
be considered as early in the dev cycle as possible.
+Security!
DevSecOps @ElizAyer
Evil User Story (aka Abuser Story) 1:
As a hacker, I want to have somebody’s benefits
paid to me instead.
2. Process: Empowered Teams & Shift Left
DevSecOps @ElizAyer
Evil User Story (aka Abuser Story) 2:
As the Russian government, I want to steal data and
release it so that I undermine confidence of the
American people in democracy.
2. Process: Empowered Teams & Shift Left
DevSecOps @ElizAyer
PEOPLE1
PROCESS 2
TOOLS3
The DevOps Value Pyramid
DevSecOps @ElizAyer
3. Tools: CI/CD
● Source Code Management
● CI/CD Systems
● Unit test framework
● Infrastructure-as-code
● etc.
31
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
32
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
Evil User
Stories
33
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
Static Code
Analysis
DevSecOps @ElizAyer
3. Enhancing the Pipeline for Security
Static Application Security Testing (SAST) tools
scan for code patterns likely to cause
vulnerabilities.
Examples: SonarQube (Open Source), Fortify,
Coverity, Veracode
https://www.owasp.org/index.php/Source_Code_Analysis_Tools
35
https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch
3. Tools: Development Pipeline
Dynamic
Analysis
DevSecOps @ElizAyer
3. Enhancing the Pipeline for Security
Dynamic Application Security Testing (DAST)
tools scan a running application for
vulnerabilities or assist in manual penetration
testing.
OSS Examples: Arachni, Metasploit, sqlmap*
DevSecOps @ElizAyer
Why would you not point hacker tools at your
application? They will!
Back to the story...
DevSecOps @ElizAyer
Would any of this have helped our Eligibility
System deliver?
Nope.
DevSecOps @ElizAyer
That project was held up by compliance.
DevSecOps @ElizAyer
In order to be compliant, you generally need
controls or a POAM - a Plan of Action and
Milestones.
DevSecOps @ElizAyer
In order to agree what to POAM, you need a
threat model.
How to get towards
DevSecOps
DevSecOps @ElizAyer
Threat modeling: the key to initiating
DevSecOps
Help translate fears into a threat model.
Help translate fears into a threat model.
Help translate fears into a threat model.
1
2
3
What is a threat model? (OWASP)
“Most of the time, a threat model includes:
● A description / design / model of what you’re worried about
● A list of assumptions that can be checked or challenged in the future
as the threat landscape changes
● A list of potential threats to the system
● A list of actions to be taken for each threat
● A way of validating the model and threats, and verification of success
of actions taken
Our motto is: Threat modelling: the sooner the better, but never too late.”
https://www.owasp.org/index.php/Application_Threat_Modeling
Threat Modelling Exercise:
Your trip home from Agile 2019 (from here to when you
walk in your front door).
1. What could go wrong?
DevSecOps @ElizAyer
What could go wrong Agile 2019-> Home
[Crowdsourced]
● Flight delay, cancelled,
● TSA
● Lost luggage, passport/id
● Forget keys (house, car)
● Random act of violence
● Shut down freeways/metro,
beltway traffic
● Car accident
● Personal sickness
● Lose your phone -
● GPS malfunction
●
● Wrong airport
● Alien abduction
● Uber goes out of business
● Water taxi piracy
● Car stolen/hacked
● Call from work for actual
problem, miss transport
● Oversleep
●
Threat Modelling Exercise:
Your trip home from Agile 2019 (from here to when you
walk in your front door).
2. What could you do to prevent or mitigate the
threats?
DevSecOps @ElizAyer
For me….
I would have threat modelled car accidents, traffic,
missed or delayed flights….
DevSecOps @ElizAyer
For me what did happen
I failed to get permissions until literally the last possible second.
All sane flights were gone by the time I could book them.
I did my best and ended up with two separate bookings.
SeaTac immigration was a madhouse, and I missed the second.
They booked me into a hotel room without a bed or shower.
I’ve revised my threat model
DevSecOps @ElizAyer
Why do threat modeling? (OWASP)
● Build a secure design
● Efficient investment of resources; appropriately prioritize security,
development, and other tasks
● Bring Security and Development together to collaborate on a shared
understanding, informing development of the system
● Identify threats and compliance requirements, and evaluate their risk
● Define and build required controls.
● Balance risks, controls, and usability
● Identify where building a control is unnecessary, based on acceptable risk
● Identification of security test cases / security test scenarios to test the
security requirements
https://www.owasp.org/index.php/Application_Threat_Modeling (abridged)
Identify & prioritize security improvements
https://tech.gsa.gov/guides/dev_sec_ops_guide/
Identify & prioritize security improvements
Identify & prioritize security improvements
Case study:
DevOps and Security on
a Small Team by Aidan
Feldman, 18F
In Summary...
To fully realize the joint benefits of speed and
reliability, Security/Compliance must be brought into
DevOps…
In Summary...
Incorporating Security is primarily a people activity.
Threat modelling helps develop a shared language
and set of concerns...
In Summary...
But Security is typically severely underresourced
compared to Development, so we can’t use the same
team structures. We need:
1) Basic dev team security education
2) Dev team access to expertise
3) Enough security capacity to engage
… which generally requires Senior Management Support!
In Summary...
Automation helps scale security.
You’ll get the most out of your tools investment by
prioritizing according to your threat model, involving
Security and Product.
DevSecOps @ElizAyer
DevSecOps is...
Development + Security + Operations =
Safer Software Sooner
DevSecOps @ElizAyer
Resources!
DevSecOps: The Missing Link in Delivering on the Promise
of Business Velocity (Webinar feat. @realgenekim
@wickett)
https://xebialabs.com/community/webinars/devsecops-missing-li
nk-of-business-velocity/
The Open Web Application Security Project
https://www.owasp.org/
GSA DevSecOps Guide https://tech.gsa.gov/guides/dev_sec_ops_guide/
Agile Application Security (Book)
https://www.oreilly.com/library/view/agile-application-security/9781491938836/
Discussion

More Related Content

What's hot

What's hot (20)

DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
DevOps Introduction
DevOps IntroductionDevOps Introduction
DevOps Introduction
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Four pillars of DevOps - John Shaw - Agile Cambridge 2014
Four pillars of DevOps - John Shaw - Agile Cambridge 2014Four pillars of DevOps - John Shaw - Agile Cambridge 2014
Four pillars of DevOps - John Shaw - Agile Cambridge 2014
 
10 Business Advantages of DevOps
10 Business Advantages of DevOps10 Business Advantages of DevOps
10 Business Advantages of DevOps
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced SecurityCode Security with GitHub Advanced Security
Code Security with GitHub Advanced Security
 
DevOps a pratical approach
DevOps a pratical approachDevOps a pratical approach
DevOps a pratical approach
 
The DevOps Journey
The DevOps JourneyThe DevOps Journey
The DevOps Journey
 
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOpsDevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
 
Slide DevSecOps Microservices
Slide DevSecOps Microservices Slide DevSecOps Microservices
Slide DevSecOps Microservices
 

Similar to DevSecOps at Agile 2019

Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 

Similar to DevSecOps at Agile 2019 (20)

The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment  (1).pdf_Best practices towards a well-polished DevSecOps environment  (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg Gryb
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibility
 
Defining DevSecOps
Defining DevSecOpsDefining DevSecOps
Defining DevSecOps
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applications
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 

More from Elizabeth Ayer

More from Elizabeth Ayer (12)

Too many cooks or not enough kitchens?
Too many cooks or not enough kitchens?Too many cooks or not enough kitchens?
Too many cooks or not enough kitchens?
 
Ethics of Influence
Ethics of InfluenceEthics of Influence
Ethics of Influence
 
Remote work a year on (FCW)
Remote work a year on (FCW)Remote work a year on (FCW)
Remote work a year on (FCW)
 
Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote Teams
 
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
Agile Traps: Common practices that wreck teams (Lesbians Who Tech 2020)
 
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous DeliveryFlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
FlowCon 2019 - Beyond the Black Hole: Product Management for Continuous Delivery
 
Continuous Product Management (Industry 2019)
Continuous Product Management (Industry 2019)Continuous Product Management (Industry 2019)
Continuous Product Management (Industry 2019)
 
The A-word Agile and Beyond 2019
The A-word   Agile and Beyond 2019The A-word   Agile and Beyond 2019
The A-word Agile and Beyond 2019
 
Uncle Sam's Recipe (Mile High Agile)
Uncle Sam's Recipe (Mile High Agile)Uncle Sam's Recipe (Mile High Agile)
Uncle Sam's Recipe (Mile High Agile)
 
Aitc2018 ux impact - elizabeth ayer
Aitc2018   ux impact - elizabeth ayer Aitc2018   ux impact - elizabeth ayer
Aitc2018 ux impact - elizabeth ayer
 
ABCDs of Database Development
ABCDs of Database DevelopmentABCDs of Database Development
ABCDs of Database Development
 
Zen and the Art of Continuous Delivery - Elizabeth Ayer
Zen and the Art of Continuous Delivery - Elizabeth AyerZen and the Art of Continuous Delivery - Elizabeth Ayer
Zen and the Art of Continuous Delivery - Elizabeth Ayer
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

DevSecOps at Agile 2019