cotalks.dev
Login
Conf42 DevSecOps 2023
Videos
1 — The Transformation of DevOps and InfoSec in AIoT | Susie Su | Conf42 DevSecOps 2023
2 — Premiere - Conf42 DevSecOps 2023
3 — The Role of IoT and 5G Devices in DDoS Attacks | Andrey Slastenov | Conf42 DevSecOps 2023
4 — Simplifying Kafka Governance for Developers | Muralidhar Basani | Conf42 DevSecOps 2023
5 — Cheap DIY Monitoring with OSS Analytics & Visualization | Robert Hodges | Conf42 DevSecOps 2023
6 — Instant Memory Training for Business Success | Chester Santos | Conf42 DevSecOps 2023
7 — How to architect for continuous delivery? | Romano Roth | Conf42 DevSecOps 2023
8 — Coding with the lights ON - OpenTelemetry from code to prod | Roni Dover | Conf42 DevSecOps 2023
9 — OpenTelemetry's Path to Observability's Future | Siddhartha Khare | Conf42 DevSecOps 2023
10 — Technical writing vs AI. Is still a worthy career path? | Tomas Fernandez | Conf42 DevSecOps 2023
11 — Git those secrets out your repos! | Daniel Oates-Lee | Conf42 DevSecOps 2023
12 — Cracking the Code of Cloud Security | Fouad Mulla | Conf42 DevSecOps 2023
13 — Ten Ways to Doom Your DevSecOps | Gene Gotimer | Conf42 DevSecOps 2023
14 — Securing Kubernetes Workloads with Istio Service Mesh | Gufran Mirza | Conf42 DevSecOps 2023
15 — Keeping Kubernetes secrets secret | Alex Soto | Conf42 DevSecOps 2023
16 — Understand & Where to use AI & Machine Learning 101 | Rich Niemiec | Conf42 DevSecOps 2023
17 — Modernizing Authorization: From Basic Roles to Decoupled ABAC | Alex Olivier | Conf42 DevSecOps 2023
18 — Hacking Demos, Dirty Secrets, Dangerous Lies, Asset Intelligence | Brian Contos | Conf42 DSO 2023
19 — CyberSecurity is too general: Why we need Security Domains | Michal Davidson | Conf42 DevSecOps 2023
20 — Configurations: The Weak Link in the Security Chain | Peleg Porat | Conf42 DevSecOps 2023
21 — Infrastructure as Code Security Best Practices & Strats | Joshua Arvin Lat | Conf42 DevSecOps 2023
22 — Your trusty Python package: TTPs of attacks on OSS in Python | Leonid Akinin | Conf42 DevSecOps 2023
23 — Supply Chain Attacks: Focused on NPM attacks | Danish Tariq & Hassan Khan | Conf42 DevSecOps 2023
24 — DevSecOps: More Than Just Pipelines | Tanya Janca | Conf42 DevSecOps 2023
25 — Effortless Secrets Management in Kubernetes | Sam Gabrail | Conf42 DevSecOps 2023
26 — Who Goes There? Detecting Intruders With Honeytokens | Dwayne McDaniel | Conf42 DevSecOps 2023
27 — Detect known unknowns | Fulvio Colombrino | Conf42 DevSecOps 2023
28 — Adding security for reliable continuous delivery | Jhonnatan Gil Chaves | Conf42 DevSecOps 2023
29 — Securing the software supply chain | Marek Najmajer & Aleksander Baranowski | Conf42 DevSecOps 2023
30 — Securing the endpoint with open software | Zach Wasserman | Conf42 DevSecOps 2023
31 — Fortifying Your Codebase with GitHub | Travis Gosselin | Conf42 DevSecOps 2023
32 — DevOpsSup - Extended DevOps approach | Grzegorz Sztandera | Conf42 DevSecOps 2023
33 — Iterative Threat Modelling: Security in Agile Development | Jagdsh Chand | Conf42 DevSecOps 2023
34 — MetricCA: Revolutionizing Metrics Collection & Analysis | Timo Pagel | Conf42 DevSecOps 2023