Many of today’s popular tools and architectures, like immutable infrastructure, promise security and compliance benefits. Yet their implementations do not always deliver, often because of overlooked complexities. Go to any conference, and you will find plenty of people spreading religion on how to run your environment the same way they do, plying automation to derive velocity, security, and compliance. Topics like immutable infrastructure, blue-green deployments, and the future of serverless architectures are all great in theory but are not based in our current reality. All too often organizations are hyperfocused on migrating their platform to a container management system instead of building their infrastructure to achieve quality velocity and security metrics.
Sam Bisbee offers a data-driven, semi-dystopian look at how organizations are actually implementing security in the cloud, based on observed behaviors and data. The answer is surprisingly bad given how big of a game the cloud and DevOps communities talk. In an effort to keep dystopian humor at a minimum, Sam will turn these observations into data-driven recommendations.
As the chief technology officer at Threat Stack, Sam Bisbee is responsible for leading the company’s strategic technology road map for its continuous security monitoring service, purpose built for cloud environments. Sam brings highly relevant experience in distributed systems in public, private, and hybrid cloud environments as well as proven success scaling SaaS startups. Sam was most recently the CXO at Cloudant (acquired by IBM in February 2014), a leader in the database-as-a-service space, where he played a senior technical and product role.
©2016, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • email@example.com