SlideShare uma empresa Scribd logo
1 de 178
Baixar para ler offline
James Wicke!
— Sr. Sec Eng & Dev Advocate @
Verica
— Author, LinkedIn Learning
— Organizer, DevOps Days Austin
& DevSecOps Days Austin
verica.io // @wickett && @aaronrinehart
Get the slides
wicke!@verica.io
verica.io // @wickett && @aaronrinehart
The Security, DevOps,
and Chaos Playbook
to Change the World
verica.io // @wickett && @aaronrinehart
Audacious
Talk Title, Yoalso it's 178 slides, so there's that too
verica.io // @wickett && @aaronrinehart
The World != Earth
verica.io // @wickett && @aaronrinehart
The World == our day to day lives in IT
verica.io // @wickett && @aaronrinehart
world as in worldview
verica.io // @wickett && @aaronrinehart
worldviewour mental model and conception of reality
verica.io // @wickett && @aaronrinehart
No one's worldview
is the same
verica.io // @wickett && @aaronrinehart
Dev and Ops and Security do
not share a worldview
verica.io // @wickett && @aaronrinehart
Disclaimer: we use DevOps and
DevSecOps interchangeably
verica.io // @wickett && @aaronrinehart
Security has known
about the worldview
disconnect for some time
verica.io // @wickett && @aaronrinehart
"many security teams
work with a worldview
where their goal is to
inhibit change as much as
possible"
verica.io // @wickett && @aaronrinehart
[Security by risk
assessment] introduces a
dangerous fallacy: that
structured inadequacy is
almost as good as
adequacy and that
underfunded security
efforts plus risk
management are about as
good as properly funded
security work
verica.io // @wickett && @aaronrinehart
Companies are spending a
great deal on security, but
we read of massive
computer-related attacks.
Clearly something is
wrong. The root of the
problem is twofold: we’re
protecting the wrong
things, and we’re hurting
productivity in the process.
verica.io // @wickett && @aaronrinehart
While engineering teams are busy
deploying leading-edge
technologies, security teams are
still focused on fighting yesterday’s
battles.
— SANS 2018 DevSecOps Survey
verica.io // @wickett && @aaronrinehart
A Highly Desireable New Breed:
The DevSecOp
verica.io // @wickett && @aaronrinehart
...not a tool
...not a CI/CD pipeline
...can’t be bought
verica.io // @wickett && @aaronrinehart
An inclusive person
participating in the movement
of security into devops.
verica.io // @wickett && @aaronrinehart
DevOps is the inevitable result of
needing to do efficient operations
in a distributed computing and
cloud environment.
— Tom Limoncelli
verica.io // @wickett && @aaronrinehart
DevSecOps is the inevitable
result of needing to do
efficient IT in a new world
verica.io // @wickett && @aaronrinehart
DevSecOps was needed to fix
the inequitable distribution of
labor
verica.io // @wickett && @aaronrinehart
100:10:1
DEV:OPS:SEC
verica.io // @wickett && @aaronrinehart
Not just the people
verica.io // @wickett && @aaronrinehart
Much
Science
verica.io // @wickett && @aaronrinehart
Security has been
on the sidelines
too long
verica.io // @wickett && @aaronrinehart
Complex Systems Traits
• Cascading Failures
• Di!cult to determine boundaries
• Difficult to Model Behavior
• Dynamic network of multiplicity
• May produce emergent phenomena
• Relationships are non-linear
• Relationships contain feedback loops
verica.io // @wickett && @aaronrinehart
verica.io // @wickett && @aaronrinehart
Examples of Complex Systems
• Global Financial Markets
• Nation-State PoliicS
• Weather Patterns
• The Human Body
• Bird Patterns
• Distributed Computing Systems (aka your systems)
verica.io // @wickett && @aaronrinehart
Fact: Outages & Breaches will
continue to get worse
verica.io // @wickett && @aaronrinehart
DEVSECOPS
verica.io // @wickett && @aaronrinehart
But, how?
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Makers
Experimentation
Automation
Safety
Unrestrained Sharing
Rugged
Empathy
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Makers
verica.io // @wickett && @aaronrinehart
We are so!ware engineers who
specialize in a specific discipline:
security
verica.io // @wickett && @aaronrinehart
Security must be able to
write code
verica.io // @wickett && @aaronrinehart
Unfortunately, that triggers
some security professionals
I am sorry for that
verica.io // @wickett && @aaronrinehart
How about
verica.io // @wickett && @aaronrinehart
Security should participate in the
so!ware delivery practice and use the
language of their peers as they
ship so!ware together
verica.io // @wickett && @aaronrinehart
With all the resources
available today...
verica.io // @wickett && @aaronrinehart
Security is part of the
making
verica.io // @wickett && @aaronrinehart
Why? Shi!ing Focus on what
ma"ers most.
verica.io // @wickett && @aaronrinehart
Value Chain
As a security professional can you
explain where you fit in your
company’s value chain?
verica.io // @wickett && @aaronrinehart
Does the company exist to deliver
product and services or employee
desktops?
verica.io // @wickett && @aaronrinehart
Everyone is responsible for the
engineering not just the security.
verica.io // @wickett && @aaronrinehart
Outcomes:
— Empathy building
— Familiarity with tools
— Able to move up the pipeline
verica.io // @wickett && @aaronrinehart
A bug is a bug is a bug
verica.io // @wickett && @aaronrinehart
Defect Density studies range
from .5 to 10 defects per KLOC
verica.io // @wickett && @aaronrinehart
Defect density
is never zero
verica.io // @wickett && @aaronrinehart
With framework/deps,
500 LOC you write can
easily be 400,000 LOC
You cannot train developers
to write secure code
all of the time
verica.io // @wickett && @aaronrinehart
Instead, focus on Methods Developers use
— TDD/BDD/ATDD
— Meaningful comments/commits
— Code Smells, Patterns, Refactoring
— Instrumentation, Observability
verica.io // @wickett && @aaronrinehart
The goal should be to
come up with a set of
automated tests that
probe and check security
configurations and
runtime system behavior
for security features that
will execute every time
the system is built and
every time it is deployed.
verica.io // @wickett && @aaronrinehart
Security is connected with
quality
verica.io // @wickett && @aaronrinehart
Makers— See security as part of engineering
— View quality as a way to bring in security
— Use code to solve problems
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Experimentation
and Learning
verica.io // @wickett && @aaronrinehart
Benefits to Experimentation
— Measured, Repeatable
— Results based on your needs
— Actionable Outcomes
verica.io // @wickett && @aaronrinehart
Security incidents are not effective
measures of detection because at
that point it's already too late
— Aaron Rinehart
verica.io // @wickett && @aaronrinehart
Know Most Likely A!acks and How
to Measure Abuse and Misuse
verica.io // @wickett && @aaronrinehart
We can't cede home field
advantage
— Zane Lackey
verica.io // @wickett && @aaronrinehart
Experimenting necessitates
understanding steady state
verica.io // @wickett && @aaronrinehart
Resources
— Shannon Lietz (@devsecops)
— DOES 2018 Talk: youtu.be/yuOuVC8xljw
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Automation
verica.io // @wickett && @aaronrinehart
Continuous Delivery is how little
you can deploy at one time
— Jez Humble & David Farley
verica.io // @wickett && @aaronrinehart
Optimize total cycle time from
code commit to running in prod
verica.io // @wickett && @aaronrinehart
15,000deploys in 3.5 years
verica.io // @wickett && @aaronrinehart
Security in the Pipeline
— Software composition analysis
— Lang linters, git-hound, ...
— Scanners, gauntlt
— Monitoring and telemetry
verica.io // @wickett && @aaronrinehart
[Deploys] can be
treated as standard
or routine changes
that have been pre-
approved by
management, and
that don’t require a
heavyweight change
review meeting.
Resources:
verica.io // @wickett && @aaronrinehart
linkedin.com/learning/devsecops-building-a-secure-
continuous-delivery-pipeline
verica.io // @wickett && @aaronrinehart
linkedin.com/learning/devsecops-automated-security-
testing
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Safety
verica.io // @wickett && @aaronrinehart
Safety and Security
have a lot in common
verica.io // @wickett && @aaronrinehart
Fact: No system is secure on
its own, it requires humans to
create it
verica.io // @wickett && @aaronrinehart
Safety Differently Origins
"Safety differently' is about relying
on people’s expertise, insights and
the dignity of work as actually done
to improve safety and efficiency. It is
about halting or pushing back on
the ever-expanding
bureaucratization and compliance
of work."
— Sydney Dekker
verica.io // @wickett && @aaronrinehart
"Security differently’ is about relying
on people’s expertise, insights and the
dignity of work as actually done to
improve security and efficiency. It is
about halting or pushing back on the
ever-expanding bureaucratization and
compliance of work."
verica.io // @wickett && @aaronrinehart
Security Currently vs. Security Differently
Security Currently Security Differently
People are the Source of
Problems
People are the Solution
Tell them what to do Ask them what they need
(Control & Compliance) Competency & Common Sense
Count absence of Negative
events
Count Presence of Positives
verica.io // @wickett && @aaronrinehart
Outcomes are the ultimate
measurement of effectiveness
verica.io // @wickett && @aaronrinehart
verica.io // @wickett && @aaronrinehart
Why do outages and breaches
seem to be happening more o!en?
verica.io // @wickett && @aaronrinehart
Flawed Understanding
Our understanding of our systems
has become fundamentally flawed
verica.io // @wickett && @aaronrinehart
Simple vs. Complex Systems
verica.io // @wickett && @aaronrinehart
Simple Systems:
Linear in nature
Easy to Predict
Able to comprehend
verica.io // @wickett && @aaronrinehart
Complex Systems:
Non-linear (bullwhip effect)
Unpredictable in nature
No mental model available
verica.io // @wickett && @aaronrinehart
Question: How well do you
really understand your own
systems? I mean really.
verica.io // @wickett && @aaronrinehart
System Engineering is a
Messy Affair
Complex Systems are
Challenging
verica.io // @wickett && @aaronrinehart
Root Cause (in a complex system) is a Myth
— Lacks full picture
— Complex systems are not linear
— Result of blame culture
— Forgets organizational decisions
— Puts the focus on the event over situation
verica.io // @wickett && @aaronrinehart
Humans aren’t the problem,
they are the solution
verica.io // @wickett && @aaronrinehart
Field Guide to 'Human-Error'
Investigations by Sydney Dekker
verica.io // @wickett && @aaronrinehart
Old View
— Human Error is a cause of trouble
— You need to find people’s mistakes, bad judgements
and inaccurate assessments
— Complex Systems are basically safe
— Unreliable, erratic humans undermine systems safety
— Make systems safer by restricting the human
condition
verica.io // @wickett && @aaronrinehart
New View
— Human error is a symptom of deeper system trouble
— Instead, understand how their assessment and actions
made sense at the time - context matters
— Complex systems are basically unsafe
— Complex systems are tradeoffs between competing
goals safety vs. efficiency
— People must create safety through practice at all
levels
verica.io // @wickett && @aaronrinehart
Failure is an
inevitable by-
product of a
complex system's
normal functioning
verica.io // @wickett && @aaronrinehart
Failures are a systems problem
because there is not enough safety
margin.
— @adrianco
verica.io // @wickett && @aaronrinehart
Where Security Fits
— Add safety margin
— Telemetry and instrumentation
— Blameless retros
— ...more to explore in this area
verica.io // @wickett && @aaronrinehart
Resources
— Drift into Failure by Dekker
— Safety Differently by Dekker
— Understanding Human Error Video Series youtu.be/
Fw3SwEXc3PU
— Richard Cook paper bit.ly/2ydDQS2
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Unrestrained
Sharing
verica.io // @wickett && @aaronrinehart
Culture is the most important
aspect to devops succeeding in
the enterprise
— Patrick DeBois
verica.io // @wickett && @aaronrinehart
DevSecOps is the extension of
the DevOps culture for the
inclusion of Security
verica.io // @wickett && @aaronrinehart
A security team who embraces
openness about what it does and
why, spreads understanding.
— Rich Smith
verica.io // @wickett && @aaronrinehart
Unrestrained Sharing
affects culture
verica.io // @wickett && @aaronrinehart
Unrestrained Sharing goes
against security's standard
operating procedure
verica.io // @wickett && @aaronrinehart
It will feel uncomfortable
verica.io // @wickett && @aaronrinehart
Sharing breaks
down silos
verica.io // @wickett && @aaronrinehart
Four Keys to Culture
— Mutual Understanding
— Shared Language
— Shared Views
— Collaborative Tooling
verica.io // @wickett && @aaronrinehart
20% of developers don't know
what security expects of them
verica.io // @wickett && @aaronrinehart
Security Shares Through
— Making invisible as visible
— Security Observability
— APIs, webhooks, dev tooling
verica.io // @wickett && @aaronrinehart
Creating a Just Culture
verica.io // @wickett && @aaronrinehart
Blameless and
Just Culturelets get rid of the Name, Blame and
Shame Culture
verica.io // @wickett && @aaronrinehart
Fear of punishment inhibits
learning
verica.io // @wickett && @aaronrinehart
Sharing includes
auditors
verica.io // @wickett && @aaronrinehart
Resources
— Phoenix Project
— Agile Application Security
— dearauditor.org
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Rugged
verica.io // @wickett && @aaronrinehart
So!ware Bill of Materials
Know what you have
verica.io // @wickett && @aaronrinehart
Favor Short Lived Systems
verica.io // @wickett && @aaronrinehart
DIE Framework
Distributed
Immutable
Ephemeral
source: @sounilyu
verica.io // @wickett && @aaronrinehart
Rugged in 2020
Deception
Chaos Eng
verica.io // @wickett && @aaronrinehart
Deception
— Honeypots, Tarpits, Mantraps
— Simple to get started (http headers)
— HoneyPy, DeceptionLogic
verica.io // @wickett && @aaronrinehart
We’re moving from disaster
recovery to chaos engineering to
resiliency
— @adrianco
verica.io // @wickett && @aaronrinehart
Resilience doesn’t mean
what you think it means
verica.io // @wickett && @aaronrinehart
Resilience != DR/BCP
verica.io // @wickett && @aaronrinehart
Our systems almost never fail
the way we think it will
verica.io // @wickett && @aaronrinehart
Resilience is the ability of systems
to prevent or adapt to changing
conditions in order to maintain
control over a system property…to
ensure safety… and to avoid failure.
— Hollnagel, Woods, & Leveson
verica.io // @wickett && @aaronrinehart
Failure is the
Normal Condition
verica.io // @wickett && @aaronrinehart
Where is the Safety Margin in
Security?
verica.io // @wickett && @aaronrinehart
How do you know when your
ge!ing close to falling off the
edge?
Do we have to fall off of the
edge to know where it is?
verica.io // @wickett && @aaronrinehart
[Chaos Engineering is] empirical
rather than formal. We don’t use
models to understand what the
system should do. We run
experiments to learn what it does.
— Michael Nygard, Release It 2nd Ed.
verica.io // @wickett && @aaronrinehart
Security LOVES Chaos Engineering
verica.io // @wickett && @aaronrinehart
Chaos Engineering Flips the Model
Postmortems = Preparation
verica.io // @wickett && @aaronrinehart
verica.io // @wickett && @aaronrinehart
verica.io // @wickett && @aaronrinehart
Create Objective Feedback
Loops about Security
Effectiveness
verica.io // @wickett && @aaronrinehart
The security discipline of [chaos]
experimentation is done in order
to build confidence in the system’s
ability to defend against malicious
conditions.
verica.io // @wickett && @aaronrinehart
Chaos Engineering
— Experiments that span eng and security
— Manual opt-out
— Valuable Learning
— Controlled experiment blast radius
verica.io // @wickett && @aaronrinehart
Security Problems that Plague Complex Systems
— Configuration drift over time
— Regressions in code where previously solved vulnerabilities are
reintroduced
— Role and privilege changes for users and applications
— Additive code or microservice that introduces a downstream
vulnerability
— Security controls not placed in correct locations in the system
— Bullwhip effect in systems where small security change results
in widespread outage
verica.io // @wickett && @aaronrinehart
Outside-In Approach to SCE
— SCE does not validate a config, it exercises it
— SCE does not check auth privileges, it attempts to
thwart them
— SCE does not trust network settings, it sends real traffic
— SCE does not check app policy, it interacts with the
application
— SCE does not build a model from infrastructure
templates, it builds understanding from experimentation
verica.io // @wickett && @aaronrinehart
4 Steps of Security Chaos Engineering
— Define expected behavior of a security defense
— Hypothesize that when security turbulence is
introduced it will be either prevented, remediated, or
detected.
— Introduce a variable that introduces security
turbulence.
— Try to disprove the hypothesis by looking for a
difference in expected behavior and actual behavior
verica.io // @wickett && @aaronrinehart
Example: ChaoSlingr: Misconfigured Port
verica.io // @wickett && @aaronrinehart
verica.io // @wickett && @aaronrinehart
verica.io // @wickett && @aaronrinehart
Resources
— Aaron Rinehart's talk at RSA youtu.be/wLlME4Ve1go
— principlesofchaos.org
— Release It! 2nd ed., Nygard
— Phillip Maddux's talk: youtu.be/k81xKjCEeqE
— Herb Todd's talk: youtu.be/Cf_XXmRLnRQ
verica.io // @wickett && @aaronrinehart
MEASURE
verica.io // @wickett && @aaronrinehart
Empathy
verica.io // @wickett && @aaronrinehart
Empathy
is a two way street
verica.io // @wickett && @aaronrinehart
Rewarding Empathy Experiment
Training 1000 Security Professionals
to Code Python
verica.io // @wickett && @aaronrinehart
those stupid developers
— Security
verica.io // @wickett && @aaronrinehart
you want a machine powered off
and unplugged
— Developer
verica.io // @wickett && @aaronrinehart
Half of developers say that
don't have enough time to
spend on security
Don’t be a blocker
be an enabler
verica.io // @wickett && @aaronrinehart
Makers
Experimentation
Automation
Safety
Unrestrained Sharing
Rugged
Empathy
verica.io // @wickett && @aaronrinehart
New O'Reilly Book on SCE
verica.io // @wickett && @aaronrinehart
Next Week:
* Dive into 1-2 of the MEASURE areas
* Find a place to add value
In a Month:
* Present on MEASURE to your company
* Bring Dev/Ops/Sec together to find a joint
improvement
In 6 months:
* Share externally your DevSecOps Journey
verica.io // @wickett && @aaronrinehart
Get the slides
and book update info
wicke!@verica.io
verica.io // @wickett && @aaronrinehart

Mais conteúdo relacionado

Mais procurados

DevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneDevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneJames Wickett
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019James Wickett
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOpJames Wickett
 
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecAppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecJames Wickett
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS LaneJames Wickett
 
Epistemological Problem of Application Security
Epistemological Problem of Application SecurityEpistemological Problem of Application Security
Epistemological Problem of Application SecurityJames Wickett
 
How to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityHow to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityJames Wickett
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-NapocaFrom Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napocajerryhargrove
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactSBWebinars
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Erkang Zheng
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecJames Wickett
 
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015James Wickett
 
New Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityNew Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityJames Wickett
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentJames Wickett
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringAaron Rinehart
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering Aaron Rinehart
 
LambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless ApplicationLambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless ApplicationJames Wickett
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019 Elizabeth Ayer
 

Mais procurados (20)

DevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS LaneDevOpsDays Austin: Security in the FaaS Lane
DevOpsDays Austin: Security in the FaaS Lane
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOp
 
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSecAppSec California 2018: The Path of DevOps Enlightenment for InfoSec
AppSec California 2018: The Path of DevOps Enlightenment for InfoSec
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS Lane
 
Epistemological Problem of Application Security
Epistemological Problem of Application SecurityEpistemological Problem of Application Security
Epistemological Problem of Application Security
 
How to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityHow to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application Security
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-NapocaFrom Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High Impact
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSec
 
Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015Pragmatic Security and Rugged DevOps - SXSW 2015
Pragmatic Security and Rugged DevOps - SXSW 2015
 
New Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application SecurityNew Farming Methods in the Epistemological Wasteland of Application Security
New Farming Methods in the Epistemological Wasteland of Application Security
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
 
LambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless ApplicationLambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless Application
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 
Defining DevSecOps
Defining DevSecOpsDefining DevSecOps
Defining DevSecOps
 

Semelhante a The Security, DevOps, and Chaos Playbook to Change the World

The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019James Wickett
 
Application Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery WorldApplication Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery WorldJames Wickett
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineJames Wickett
 
Why Automate the Network?
Why Automate the Network?Why Automate the Network?
Why Automate the Network?Hank Preston
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentVMware Tanzu
 
The Future of Ops
The Future of OpsThe Future of Ops
The Future of OpsTyler Treat
 
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic StylesIRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic StylesIRJET Journal
 
Data Driven Decisions in DevOps
Data Driven Decisions in DevOpsData Driven Decisions in DevOps
Data Driven Decisions in DevOpsLeon Stigter
 
ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)
ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)
ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)hobbs
 
Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)
Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)
Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)VMware Tanzu
 
Mobile application architecture
Mobile application architectureMobile application architecture
Mobile application architectureChristos Matskas
 
Keep it Secret, Keep it Safe - Docker Secrets and DI
Keep it Secret, Keep it Safe - Docker Secrets and DIKeep it Secret, Keep it Safe - Docker Secrets and DI
Keep it Secret, Keep it Safe - Docker Secrets and DIDana Luther
 
Introduction to Cx v11.pptx
Introduction to Cx v11.pptxIntroduction to Cx v11.pptx
Introduction to Cx v11.pptxHikmanAmanKhan
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration SecurityDevOps.com
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 
Cisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Canada
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Jason Mashak
 
AT&T IoT Hackathon - Seattle
AT&T IoT Hackathon - SeattleAT&T IoT Hackathon - Seattle
AT&T IoT Hackathon - SeattleEd Donahue
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610
Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610
Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610Cisco DevNet
 

Semelhante a The Security, DevOps, and Chaos Playbook to Change the World (20)

The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019The New Ways of DevSecOps - The Secure Dev 2019
The New Ways of DevSecOps - The Secure Dev 2019
 
Application Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery WorldApplication Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery World
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
 
Why Automate the Network?
Why Automate the Network?Why Automate the Network?
Why Automate the Network?
 
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software DevelopmentDefense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
 
The Future of Ops
The Future of OpsThe Future of Ops
The Future of Ops
 
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic StylesIRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
 
Data Driven Decisions in DevOps
Data Driven Decisions in DevOpsData Driven Decisions in DevOps
Data Driven Decisions in DevOps
 
ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)
ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)
ActiveState Stackato and Lessons Learned with Cloud Foundry (CF Summit 2014)
 
Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)
Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)
Stackato & Lessons Learned with Cloud Foundry (Cloud Foundry Summit 2014)
 
Mobile application architecture
Mobile application architectureMobile application architecture
Mobile application architecture
 
Keep it Secret, Keep it Safe - Docker Secrets and DI
Keep it Secret, Keep it Safe - Docker Secrets and DIKeep it Secret, Keep it Safe - Docker Secrets and DI
Keep it Secret, Keep it Safe - Docker Secrets and DI
 
Introduction to Cx v11.pptx
Introduction to Cx v11.pptxIntroduction to Cx v11.pptx
Introduction to Cx v11.pptx
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Cisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev net
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
AT&T IoT Hackathon - Seattle
AT&T IoT Hackathon - SeattleAT&T IoT Hackathon - Seattle
AT&T IoT Hackathon - Seattle
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610
Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610
Webex APIs for Admins - Cisco Live Orlando 2018 - DEVNET-3610
 

Mais de James Wickett

A Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREA Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREJames Wickett
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsJames Wickett
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldJames Wickett
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
The State of DevSecOps in 2018
The State of DevSecOps in 2018The State of DevSecOps in 2018
The State of DevSecOps in 2018James Wickett
 
DevSecOps in the Year 2018
DevSecOps in the Year 2018DevSecOps in the Year 2018
DevSecOps in the Year 2018James Wickett
 
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSecInnotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSecJames Wickett
 
Serverless Security at LASCON 2017
Serverless Security at LASCON 2017Serverless Security at LASCON 2017
Serverless Security at LASCON 2017James Wickett
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecJames Wickett
 

Mais de James Wickett (11)

A Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SREA Pragmatic Union: Security and SRE
A Pragmatic Union: Security and SRE
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The State of DevSecOps in 2018
The State of DevSecOps in 2018The State of DevSecOps in 2018
The State of DevSecOps in 2018
 
DevSecOps in the Year 2018
DevSecOps in the Year 2018DevSecOps in the Year 2018
DevSecOps in the Year 2018
 
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSecInnotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
 
Serverless Security at LASCON 2017
Serverless Security at LASCON 2017Serverless Security at LASCON 2017
Serverless Security at LASCON 2017
 
The Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSecThe Path of DevOps Enlightenment for InfoSec
The Path of DevOps Enlightenment for InfoSec
 

Último

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Último (20)

Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

The Security, DevOps, and Chaos Playbook to Change the World