In this session, we'll explore DevSecOps in terms of these assertions about where we currently are and where we need to be: Where we are: Users download packages and use simple checksum digests and commonly depend on security scanners on the final products (e.g., container, binary) before they're deployed into production. It's a less-than-optimal feedback loop for the developer, as any insight into a security threat would already have been introduced into the build pipeline after their code commits. DevSecOps is a means to inject security into every step of development so that developers get early feedback, and security risks are nullified before entering later into the build flow. Provenance verification of modules is not always easy, because few registries provide a trustable hashing service coupled with a cryptographic signing system alongside the package repository service itself. All these topics apply to software developers in well-known ecosystems like Python or Java. It also affects data scientists and even the reproducibility and predictability of AI applications. Where we’d like or need to be: The entire software build pipeline requires a complete chain of cryptographic-based attestation and non-repudiation of all artifacts committed and generated by the various actors within the supply chain. We also need to harness machine learning and AI to assist developers gain early insight into attacks introduced to their software from compromised upstream packages, security coding flaws and other risks commonly associated with software build processes and development. Join Marizol Martinez, Principal Technical Project Manager, Red Hat, Christoph Goern, Software Engineering Manager, AI Center of Excellence, Red Hat, Luke Hinds, Security Engineering Lead, Emerging Technologies, Office of the CTO, Red Hat for this discussion.

Hora

18:00 - 19:00 hs GMT+1

Organizador

Build, integrate & deploy applications faster
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2025 360 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 26 de Junio de 2025
Mar 27 de Junio de 2025
Mié 28 de Junio de 2025
Jue 29 de Junio de 2025
Vie 30 de Junio de 2025
Sáb 31 de Junio de 2025
Dom 01 de Junio de 2025
Lun 02 de Junio de 2025
Mar 03 de Junio de 2025
Mié 04 de Junio de 2025
Jue 05 de Junio de 2025
Vie 06 de Junio de 2025
Sáb 07 de Junio de 2025
Dom 08 de Junio de 2025
Lun 09 de Junio de 2025
Mar 10 de Junio de 2025
Mié 11 de Junio de 2025
Jue 12 de Junio de 2025
Vie 13 de Junio de 2025
Sáb 14 de Junio de 2025
Dom 15 de Junio de 2025
Lun 16 de Junio de 2025
Mar 17 de Junio de 2025
Mié 18 de Junio de 2025
Jue 19 de Junio de 2025
Vie 20 de Junio de 2025
Sáb 21 de Junio de 2025
Dom 22 de Junio de 2025
Lun 23 de Junio de 2025
Mar 24 de Junio de 2025
Mié 25 de Junio de 2025
Jue 26 de Junio de 2025
Vie 27 de Junio de 2025
Sáb 28 de Junio de 2025
Dom 29 de Junio de 2025
Lun 30 de Junio de 2025
Mar 01 de Junio de 2025
Mié 02 de Junio de 2025
Jue 03 de Junio de 2025
Vie 04 de Junio de 2025
Sáb 05 de Junio de 2025
Dom 06 de Junio de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado