Next week, Twistlock is sponsoring the third annual DevOps Connect: DevSecOps Edition at RSA Conference in San Francisco. On the same day, our CEO Ben Bernstein will also be presenting at AGC’s Emerging Tech conference around his concept of intent-based security. We couldn’t be more thrilled to convene with some of the most reputable DevOps and security practitioners in the industry and swap insights on the current DevOps and technology landscape. Last year’s DevOps Connect brought in more than 700 participants, and we’re expecting even larger crowds for this year’s event.
On Monday, February 13, from 10am-4pm, attendees will spend the day discussing the DevOps software supply chain, including real world, enterprise-level experience on how to implement automation. Other topics being discussed include the benefits of the software supply chain, the advantages of rugged DevOps and how to get started implementing both in an organization.
Speakers include John Willis, Evangelist for Docker, Shannon Lietz, Founder of DevSecOps Foundation, Jeff Williams, CTO at Contrast Security and many more! Sessions will cover everything DevSecOps-related, including: why next gen security needs DevOps, what the 2016 state of DevOps report means for security, and the intersection of release engineering and rugged DevOps.
DevOps Connect will jumpstart what is expected to be an enlightening and exciting RSA Conference. For additional information, visit the DevOps Connect website here. We hope to see you there, and be sure to regularly check out our Twitter channel to see real time updates from full week of RSA and DevOps activities.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
2019 Gartner Market Guide for CWPP: What You Need to KnowRead the Blog
Key Differences in Security, Management for Serverless vs. ContainersRead the Blog
Docker vs. KubernetesRead the Blog
How Cloud Workload Protection is Different than Application SecurityRead the Blog
Zero-Trust Security: What It Means and How to Achieve ItRead the Blog