Agile software development and security often don’t seem to be good bedfellows. Many traditional security methodologies for analyzing risk and threats are based on old military or government development methodologies, which are slow to change and well documented. In addition, these approaches to threat and risk management are highly optimized to work within a traditional software development lifecycle.
Michael Brunton-Spall shares a new approach to reviewing systems along with real-life examples to help you prioritize where to focus security efforts and what sorts of security threats you should worry about. This methodology has been trialed, adopted, and used in the UK government under the auspices of the Government Digital Service for Agile programs and in the National Center for Cyber Security from a security perspective. Join in to learn how to approach your system in a new way, how to think like an attacker, how to document, evaluate and rate threats, and how to communicate it effectively to both the team and to senior leadership.
Michael Brunton-Spall is an independent security consultant. Previously, Michael was deputy director for technology and operations and head of cybersecurity at the UK Government Digital Service and held a number of jobs ranging from creating low-level embedded hardware to gaming development on consoles to scaling and operating the Guardian newspaper. He is a regular conference speaker, the author of Agile Application Security, and an enthusiastic Agilist and security geek.
For exhibition and sponsorship opportunities, email velocity@oreilly.com
For information on trade opportunities with O'Reilly conferences, email partners@oreilly.com
View a complete list of Velocity contacts
©2018, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • confreg@oreilly.com