SESSION + Live Q&A
Can We Shift-Left Security in a CD Pipeline?
Implementing DevOps and Continuous Delivery should speed up your software delivery. But in practice the results can be disappointing because teams still spend a lot of time on manual work that is often related to risk & security. Especially in a highly regulated world, like the Financial sector, rules and regulations can be perceived as a huge burden.
In this talk I will discuss how this can be turned around by doing shift-left on security. Risk&Security: From burden to benefit.
Speaker
Taco Bakker
Team Manager @ING_news (ING Bank)
Taco Bakker studied Computer Science at the University of Amsterdam. After his graduation he started as an IT engineer, but quickly became a Project Manager for large IT projects. He discovered first-hand the challenges of the traditional IT approaches such as Prince2. He joined ING to...
Read moreFind Taco Bakker at:
From the same track
A Cell-Based Approach to Microservices Architecture
The number of microservices running in enterprises is growing almost exponentially. As a result, service composition, governance, security, and observability are becoming a challenge to implement and incorporate. A “cell-based” architecture is an emerging approach that can be applied to...
Paul Fremantle
Wrote an OAUTH client for MQTT, CTO, and member of Apache
Traces Are the Fuel: Making Distributed Tracing Valuable
Within our industry, it's now common knowledge that any sane microservices strategy must also account for some form of distributed tracing. However, while basic distributed traces are a good start, they are not enough to deliver true confidence about the behavior of modern production systems. In...
Ben Sigelman
Co-Founder @LightStepHQ & Co-Creator Dapper & @OpenTracing API Standard
Lost in Transaction? Consistency in Distributed Systems
You probably work on a distributed system. Even if you don't yet face a serverless microservice architecture using fancy NoSQL databases, you might simply call some remote services via REST or SOAP. This leaves you in charge of dealing with consistency yourself. ACID transactions are only...
Bernd Ruecker
Co-founder and chief technologist @Camunda
IAM Expectations: What You Ordered vs. What You Got
Imagine if you could order a black box with a button on it that says, “activate identity.” However, in real life, whatever you buy or build almost always needs some sort of customisation. In this presentation, Adam Evans, Senior Solutions Engineer at Auth0, will discuss the different...
Adam Evans
Enterprise Solutions Engineer @auth0
Deployment Patterns for API Gateways
APIs are changing the way we build applications and changing the way we expose data, both inside and outside our organizations. But what is the most efficient and effective way to deliver these APIs? That’s the job of the API gateway. In this session, we will look at different deployment...
Liam Crilly
Director of Product Management @nginx