Next week, Twistlock is sponsoring the third annual DevOps Connect: DevSecOps Edition at RSA Conference in San Francisco. On the same day, our CEO Ben Bernstein will also be presenting at AGC’s Emerging Tech conference around his concept of intent-based security. We couldn’t be more thrilled to convene with some of the most reputable DevOps and security practitioners in the industry and swap insights on the current DevOps and technology landscape. Last year’s DevOps Connect brought in more than 700 participants, and we’re expecting even larger crowds for this year’s event.
On Monday, February 13, from 10am-4pm, attendees will spend the day discussing the DevOps software supply chain, including real world, enterprise-level experience on how to implement automation. Other topics being discussed include the benefits of the software supply chain, the advantages of rugged DevOps and how to get started implementing both in an organization.
Speakers include John Willis, Evangelist for Docker, Shannon Lietz, Founder of DevSecOps Foundation, Jeff Williams, CTO at Contrast Security and many more! Sessions will cover everything DevSecOps-related, including: why next gen security needs DevOps, what the 2016 state of DevOps report means for security, and the intersection of release engineering and rugged DevOps.
DevOps Connect will jumpstart what is expected to be an enlightening and exciting RSA Conference. For additional information, visit the DevOps Connect website here. We hope to see you there, and be sure to regularly check out our Twitter channel to see real time updates from full week of RSA and DevOps activities.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
Baking Compliance in your CI/CD PipelineRead the Blog
Serverless Security Suggestions: Tips for Keeping Serverless Functions SecureRead the Blog
Why a Common Security Toolset is Essential for DevSecOpsRead the Blog
Putting the “Ops” in DevSecOps: Why It’s Hard and How to Do ItRead the Blog
Why the Point Solution Mindset for IT Security is DeadRead the Blog