4–7 Nov 2019

Schedule: Security sessions

Add to your personal schedule
11:0011:45 Wednesday, 6 November 2019
Location: Hall A2
Avi Douglen (Bounce Security)
Average rating: ***..
(3.56, 9 ratings)
Threat modeling is a great method to identify potential security weaknesses, an important part of any secure design. But it's often ignored due to high cost and the time investment of classic approaches. Avi Douglen outlines how to use a lightweight, value-driven approach to embed security into the agile design process. No more top-heavy, big-model-up-front threat modeling that security pros love. Read more.
Add to your personal schedule
15:0015:45 Thursday, 7 November 2019
Location: M4/M5
Secondary topics:  Best Practice
Jibby Ani (Welkin)
Jibby Ayo-Ani walks you through an approach to the security model of BeyondCorp within a startup. BeyondCorp is an enterprise security model created and improved upon by Google that assigns access controls to individual devices and users rather than networks. Read more.
  • AXA
  • Contentful
  • Datadog
  • HERE Technologies
  • QAware
  • SIG
  • Zara Tech
  • GitLab
  • NearForm
  • WhiteSource
  • Cloud Native Computing Foundation

Contact us

confreg@oreilly.com

For conference registration information and customer service

partners@oreilly.com

For more information on community discounts and trade opportunities with O’Reilly conferences

Become a sponsor

For information on exhibiting or sponsoring a conference

pr@oreilly.com

For media/analyst press inquires