30
CONFERENCE GUIDE

CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

CONFERENCEGUIDE

Page 2: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

2

Join the conversation and share your DevSecCon experience with those who couldn’t make it!

#DevSecCon

WELCOMEThank you for choosing to spend your day with us at DevSecCon Asia 2017. We are really proud to be in Singapore for the first time and to bring so many inspiring speakers and workshops to you today, to share our vision of creating continuously secure solutions.

Traditional Security is often counterproductive because it exists in isolation to the business drivers and development processes. We want to tear down these walls and create a new era in which DevOps and Security embrace collaboration, and thus enabling Developers to create applications which are secure from requirements to the final product.

DevSecCon is a platform for professionals to learn ways to implement these new ideas into their business and help them to challenge the approach to secure development and delivery in their organisations.

We hope you enjoy the day and can’t wait to hear your feedback to tailor our next event accordingly.

Francois Raynaud, Stefan Streichsbier, Suman Sourav and Lisa RaynaudThe DevSecCon Asia Team

Page 3: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

3

TABLE OF CONTENTSAGENDA 4

SESSION CATEGORIES 6

TALK TRACK (MORNING) 7

WORKSHOP TRACK (MORNING) 12

TALK TRACK (AFTERNOON) 14

WORKSHOP TRACK (AFTERNOON) 22

MEET OUR SPEAKERS 24

OUR SPONSORS 26

VENUE MAP BACK PAGE

We want to hear your feedback

Help us to improve DevSecCon by participating in a five minute survey.

Upon completing the survey, you will automatically be entered in a raffle for the chance to win one of three free tickets for DevSecCon Asia 2018.

To take the survey, go to www.devseccon.com/asia-2017/survey

Or scan the QR code.

Page 4: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

4

AGENDA

MORNING

08:30 Atrium Ballroom Foyer

Registration and breakfast buffet

09:25 Atrium Ballroom

Opening speech

09:30 Atrium Ballroom

Keynote

TALK TRACKAtrium Ballroom

WORKSHOP TRACKOrchard Room

10:00 CD and Segregation of Duties (SoD)

10:00 Automated infrastructure security monitoring and defence10:30

Extending and securing Chat-Ops

10:55 10 minute break

11:05 Integrating crowdsourced security into agile SDLC

11:35 AppSec DevOps automation – real world cases

12:00 Atrium Ballroom Foyer

Lunch buffet and break

Page 5: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

5

TALK TRACKAtrium Ballroom

WORKSHOP TRACKOrchard Room

13:00 Securing the container DevOps pipeline

13:00 Developing a high-performance security focussed Agile Team

13:30 Building an application vulnerability toolchain for DevSecOps

14:00 Using open source automation tools for DevSecOps

14:30 A trip through the security of DevOps tools

14:55 10 minute break

15:05 From resilient to antifragile – chaos engineering primer

15:05 Automated testing and security

15:35 DevSecOps in the government

16:05 Testing IOT application endpoints

16:35 Using adversarial modelling in driving secure application development

17:00 Bobby’s Restaurant and Bar

Networking drinks

AFTERNOON/ EVENING

Page 6: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

SESSION CATEGORIES

To help you choose which sessions to attend, we have grouped them into these categories:

PIPELINE

SSDLC (Secure Software Delivery Life Cycle)

CONTAINERS

RESILIENCE

IOT (Internet of Things)

To provide a quick overview, the respective category symbols are listed above the talk and workshop titles on the following pages – for example P for Pipeline.

P

S

C

R

I

6

Page 7: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (MORNING)

7

09:25 Atrium Ballroom

Opening speech

A few words from the DevSecCon Asia team.

09:30 Atrium Ballroom

Keynote: Security is shifting left

Security has mostly operated towards the right of implementation just prior to deployment. With the introduction of Continuous Delivery, security must shift left and new processes, tools and skills must be formed. From risk acceptance, back to architectural decisions, everything security must be re-imagined in order to realise the vision of safer software sooner. Whether you practice DevOps or have been in the business or protecting workloads, this change is both exciting and somewhat mystifying. To further this global change, we’ve enlisted the help of heroes like you to highlight the path forward. Come join us to hear about the journey and enjoy some humorous tales.

Shannon LietzDevSecOps Lead, Intuit

Page 8: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (MORNING)

8

10:00 Atrium Ballroom P

CD and Segregation of Duties (SoD)

Today, business and IT want to keep releasing fixes and new features to production quickly. However, policies and processes often introduce delays in deployment, and prevent the actual people who know to solve problems, from solving the problems. Instead it becomes a circus of raising tickets, getting sign offs, etc. Upon enquiry, we’re all told “This is to ensure Segregation of Duties”.

In this talk, we will cover what the authoritative articles on SoD say, our interpretation of the intent, and how we believe the intent can be fulfilled while permitting frequent deployments and much more flexible troubleshooting on production.

This talk will likely raise some controversial points and interpretations, but we hope that this will push the industry to have a reality check and modernise approaches.

Sriram NarayananDevOps and CD Consultant, ThoughtWorks

Page 9: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (MORNING)

9

10:30 Atrium Ballroom S P

Extending and securing Chat-Ops

In this talk I will showcase chat tools extensions with Hubot and how to make chat and ops work well with a collaborative approach – taking lessons from DevOps and Agile ways of working. We will get into depths of bot-driven ops and making it effective in large enterprises by securing it with 2FA (Two Factor Authentication). Attendees will learn how to integrate security and bullet proof chat operations.

Key takeaways:

• Understanding the need for additional ops-security in large enterprises and solving it innovatively.

• Details about the usage of Two Factor Authentication and its powers to secure operations triggered from chat tools.

• New ways to integrate and extend the powers of bots.

Arun NarayanaswamySenior Manager Engineering

Page 10: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (MORNING)

10

11:05 Atrium Ballroom S

Integrating crowdsourced security into agile SDLC

In an ideal world, security involvement should be part of the initial Portfolio Kanban when decisions on product design are being made. Small and medium-sized businesses are usually struggling with resources and a lack of the necessary security skill-set to provide valuable input into these patterns of core software development stages.

When developing an MVP (Minimum Viable Product) it is crucial that proper security assessments are conducted regardless of the customer set that it will be tested with and all the findings are remediated properly prior to release. One of the ways to cope with modern challenges is by adopting a crowdsourced approach. This enables extremely flexible methodologies with endless skill-set pools to integrate into various stages of the SDLC cycle (awareness, design review, source code analysis, threat modelling, penetration testing, risk workflow tracking etc.) to cope with today’s ever-evolving threats.

The presenter has been involved into all the mentioned DevSec phases and processes from two completely different perspectives: as a CISO and as a crowdsourced security researcher. In this talk we will share experiences and answer various questions and theories about “what will DevSecOps actually look like in the near future” and what can be done to make DevOps more resilient.

Ante GulamGlobal CISO, MetaPack Group

Page 11: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (MORNING)

11

11:35 Atrium Ballroom S

AppSec DevOps automation – real world cases

Everybody wants to create the perfect AppSec test automation as part of DevOps. Transparently identifying security vulnerabilities as code is created and fixing them before they are ever noticed. But how does this work in real life? In this session we will review real world examples of building a successful automation process for delivery of secure software by DevOps groups.

The talk will begin with a quick review of the main challenges introduced by moving to a fast-pace (agile) software development world, where time-frames from coding to delivery can be as short as a few days, leaving no room for traditional security audits and reviews that were the main practice in the past.

Following that, we will present the core principles of continuous integration and testing automation as they are deployed and managed by DevOps, and analyse many of the pitfalls organisations are facing in the attempt to move from the theoretical practice to implementation of such a process.

Finally, we will examine three cases of customers (Retail, Insurance and Software Vendor), who have successfully built a process that works. At the end of the session, participants will have a much broader view on practical ways of building successful automation of secure coding practices.

Ofer MaorDirector of Security Strategy, Synopsys

Page 12: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

WORKSHOP TRACK (MORNING)

12

10:00 Orchard Room R

Automated infrastructure security monitoring and defence

Monitoring for application attacks and defending them in real-time is crucial. Crunch through all the logs from the various sources (web servers, applications, waf etc.) to gain insights from anomalies in real-time. Making the right choices from the attacks can prove to be a nightmare. Even with the solutions already available in the market.

In this training we can see attacks happening in real-time using a centralised dashboard. By collecting logs from various sources we will monitor and analyse the attacks. Using data gleaned from the logs, we can apply defensive rules against the attackers. We will be using open source technologies to build this monitoring solution.

Workshop attendees will receive a comprehensive walk-through E-book, Ansible Playbooks, custom scripts and best practices check-lists.

What attendees will need in order to participate:• This workshop is intended for beginner to mid-

level, participants should be comfortable with basic Linux CLI usage

• Laptop with administrative privileges• VirtualBox 5 (or) above• 10GB hard disk space for virtual machines

• Minimum 4 GB RAM

Madhu Akula Akash MahajanAutomation Security Ninja, Appsecco

Director, Appsecco

Page 13: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

WORKSHOP TRACK (MORNING)

13

NOTES

Page 14: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

14

13:00 Atrium Ballroom C P

Securing the container DevOps pipeline

Adoption of container technology has surged due to the standardisation and usability resulting from the Docker open sourcing effort and, as a result, the Open Container Initiative (OCI). Many DevOps practitioners leverage the portability and agility provided by containers in their CI/CD pipelines.

With the rise of automation capabilities and technologies, that manage this pipeline, it is critical to make sure that all aspects of the container’s content and delivery are secure. Where did the container come from? Is it signed? Can we authenticate it? What’s inside? There are so many questions that also need to be automated to insure the steady and secure deployment of mission critical containers onto the container platform. Also it is important that proper audit and forensics capabilities are enabled to help pinpoint vulnerabilities during or post event.

This talk looks at current CI/CD pipelines for container deployment and discusses areas where DevSecOps practitioners should focus. Much of the tooling today comes from popular open source technologies. This has many benefits. But trying to manage all of these tools, working together, and securely, can consume a lot of time and can expose its own vulnerabilities. How do we secure the software supply chain and the assets moving through that pipeline?

William HenryDevOps Strategy Lead, Red Hat Inc.

Page 15: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

15

13:30 Atrium Ballroom C P

Building an application vulnerability toolchain for DevSecOps

One of the key challenges for application security in DevOps, is that scaling vulnerability assessment, effectively is very challenging. Sure, some scanners come with plugins and integrations with CI tools, but with complex applications, API/Web services and complex business logic, vulnerability assessment without context, instrumentation and parameterisation leads to a large number of false-negatives, which is the worst kind of outcome.

My talk draws from multiple implementations of application security in DevOps, where one can create powerful, automated vulnerability toolchains that are automatically triggered and managed, auto-scaled (with containers) and provide a much higher quality of results through effective instrumentation, parameterisation and context, oh and did I mention, completely automated. The talk also delves into some key success factors for automated, instrumented vulnerability scanning at scale for applications. I will showcase an internally developed tool (will be released open source) for instrumented scanning of API using popular scanners like OWASP ZAP, w3af and BurpSuite. The objective of this talk is to give the audience a perspective of how they can unlock a higher quality of application vulnerability scanning at scale in their DevOps implementation.

Abhay BhargavCTO, we45

Page 16: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

16

14:00 Atrium Ballroom P

Using open source automation tools for DevSecOps

Automation tools are key for managing DevOps and DevSecOps.

In this talk we’ll focus on setting up open source automation tools and their environment, using readily available modules for deploying servers/ services, scaling, security compliance, monitoring, managing operations, patch management, configuration and more.

Moving on to developing customised modules, tweaking them as required for operation and finally managing identity and credentials for managing enterprise services is key for success.

Joel DivekarFounder / CTO, Adi.technology

Page 17: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

17

14:30 Atrium Ballroom P

A trip through the security of DevOps tools

Nowadays, security has become a very hot issue. With the DevOps philosophy spreading everywhere and the growing idea that now you could build a new project within a few days, some projects have started to leave security aside to focus on quickly delivering functionalities instead.

But how can we ignore today that the lack of security awareness comes with a price?

This presentation will be a feedback from developers working on Incident Response and Malware Analysis, an open source project we’ve been developing since 2014.

From virtualization to automation, I will talk about security pitfalls and difficulties we’ve been through and will also share our experience on how to use those Devops tools in secure environments: Who to trust? Which tools are more secured than others? How to combine everything in an offline environment due to security constraints? Do you really trust the Internet? We’ll also speak about good and bad practices, e.g. the usual “curl https://mywebsite/install.sh | sudo bash” or privileged users in Ansible runs.

Finally, I’ll talk about practical issues we’ve been facing for all our products: the offline (aka I-cant-connect-my-server-to-the-Evil-Internet) installation. How do you manage external dependencies? Security updates?

Guillaume DedrieR&D Developer, Quarkslab

Page 18: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

18

15:05 Atrium Ballroom R

From resilient to antifragile – chaos engineering primer

Monkeys, Lemurs & Locusts Oh “We bought a Zoo” – Is the idea of a midnight meltdown keeping you up at night? Can we inject failure scenarios into deployed systems to reduce platform risk?

During this talk, demonstrations of the Simian Army, Chaos Lemur and Locust.io tools will be presented. We will go beyond reliability, stability and availability to help your platform operations team build a continuous process improvement program which will prepare your production systems for the unexpected.

Sergiu BodiuPlatform Architect, Pivotal

Page 19: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

19

15:35 Atrium Ballroom R

DevSecOps in the government

Singapore is known to be efficient and so is the government.

As Singapore’s software engineers adopt DevOps as part of the software development methodologies, the pace of software releases and changes are faster than the previously used waterfall method. Security has to keep up to pace with this change and DevSecOps is now more relevant.

As the government manages different classification of data, there are different considerations and challenges to the architecture. As a DevSecOps engineer, these challenges are not easy to solve but it looks promising that the quality of Singapore government’s software is improving, and security is also a top priority.

The talk will discuss some of the common challenges in government context and some solutions to overcome them.

Fabian LimDevSecOps Engineer, GovTech

Page 20: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

20

16:05 Atrium Ballroom R I

Testing IOT application endpoints

As we all connect everything in our homes to the Internet, we need to seriously consider the security of the endpoints we place in our homes and use every day. Our security cameras, water heaters and garage door openers, are offering control and convenience like we have never seen and their use can be exposing sensitive data to the world.

IOT is not at all about the Internet, we already know quite a bit about the Internet and its problems. IOT is all about the “things”. Have we placed enough importance on the “things” from a security perspective? From exposing WIFI passwords via connected light bulbs to location tracking of family members to data collected regarding consumption rates, there are many problems that IOT can bring with all the solutions its known for.

Taking a deep look into a few of these devices and understanding their communication reveals that we are exposing our homes, our families, to attacks against these devices.

Utilising web security and infrastructure security assessment practices we will take a deep dive into IOT devices and applications to show the types of attacks that are available and how to mitigate the risk this new attack surface presents. I will show some resources to see Internet connected devices all over the world as well as illustrate what can happen if these devices are breached.

Jason KentVP of Product Management, Qualys

Page 21: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

TALK TRACK (AFTERNOON)

21

16:35 Atrium Ballroom R S

Using adversarial modelling in driving secure application development

Use cases are helpful for eliciting, communicating and documenting requirements. Additionally, use cases are also useful in gaining an understanding of the features of the application. Similarly, to identify threats that can materialize within an application, the concept of misuse cases was introduced as a means of conceptualising the different possibilities of attacks against an application. Thus, in the context of secure application development, this provides product development teams actionable insights during the development process to combat techniques that are adopted by an adversary.

The speaker will share his thoughts and strategies around conducting modelling and simulation from an adversarial perspective. Attendees will be introduced to an intentionally flawed application and will be exposed to tools/techniques in determining the various attack scenarios that may be subjected upon it.

Pishu MahtaniApplication Security Consultant, SpiderLabs

Page 22: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

WORKSHOP TRACK (AFTERNOON)

22

13:00 Orchard Room S

Developing a high-performance security focussed Agile Team

Quality (security included) does not have to be neglected when you’re planning, building and running a high-performance development team. Kim will set the stage with how and why Agile development teams fail, explained with a familiar anecdote taken from his new book, coupled with how you can change this. Kim will then discuss and demo a set of light weight processes, practises and tools, that when combined have proven their value in:

1. Aiding high throughput (reducing time to market)

2. Significantly increasing quality (finding and removing bugs)

3. Without de-scoping

And all while reducing total project cost (fact). If this sounds like breaking the laws of physics, or too good to be true, then this workshop is for you.

What attendees will need in order to participate:In order to participate in this session, you will need a laptop that has at least one of the following:• VirtualBox installed to run a vbox image• Some virtualisation software installed that can

create a VM with a .vmdk disk imageIf attendees do not have the VM or components set-up before the workshop, Kim will be passing a VM around via NTFS formatted USB stick.

Kim CarterDirector, BinaryMist

Page 23: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

WORKSHOP TRACK (AFTERNOON)

23

15:05 Orchard Room P

Automated testing and security

Companies want to deploy code at an ever-increasing pace. You should test your code to ensure that security concerns are addressed before pushing to production. Manual testing is time consuming and relies on humans, which presents a range of issues. By automating tests, you can use repeatable processes to test code before packaging and deployment. Automated tests should be included in your workflow and you should test at multiple stages of development, not just at the end of the development cycle or sprint.

This workshop will illustrate approaches to testing, such as threat analysis and testing techniques. It will also include demonstrations using Puppet as the code base, with Jira, BBS, and Bamboo as an example toolchain to show a workflow for automated testing of the code at different stages of development for different reasons.

Brett GrayPrincipal Solutions and Services Engineer, Puppet

Page 24: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

24

MEET OUR SPEAKERSA big thanks to all our speakers for sharing their knowledge and experience today.

ABHAY BHARGAVCTO, we45

AKASH MAHAJANDirector, Appsecco

ANTE GULAMGlobal CISO, MetaPack Group

ARUN NARAYANASWAMYSenior Manager Engineering

BRETT GRAYPrincipal Solutions and Services Engineer, Puppet

FABIAN LIMDevSecOps Engineer, GovTech

GUILLAUME DEDRIER&D Developer, Quarkslab

JASON KENTVP of Product Management, Qualys

Page 25: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

25

KIM CARTERDirector, BinaryMist

JOEL DIVEKARFounder / CTO, Adi.technology

MADHU AKULAAutomation Security Ninja,

Appsecco

OFER MAORDirector of Security Strategy,

Synopsys

PISHU MAHTANIApplication Security Consultant,

SpiderLabs

SERGIU BODIUPlatform Architect, Pivotal

SHANNON LIETZDevSecOps Lead, Intuit

SRIRAM NARAYANANDevOps and CD Consultant,

ThoughtWorks

WILLIAM HENRYDevOps Strategy Lead,

Red Hat Inc.

Page 26: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

26

OUR SPONSORS

DevSecCon would not be possible without the generous support from our sponsors. A special thanks to all supporters, we are looking forward to seeing you in the networking area.

Gold sponsors

Silver sponsors

Bronze sponsors

Page 27: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

27

GOLD SPONSORS

GitHub

GitHub is how people build software. Millions of individuals and organisations around the world use GitHub to discover, share, and collaborate on software — from games and experiments to popular frameworks and leading applications. Together, we’re defining how software is built today.

Whether you use GitHub.com or GitHub Enterprise on your own servers, you can access one of the world’s largest developer communities to build software in the way that works best for you. Choose your deployment option and integrate your favourite third party tools into a powerful, collaborative workflow.

GovTech

Coming from the restructured Infocomm Development Authority of Singapore, we are now Government Technology Agency of Singapore (GovTech).

The Government Technology Agency of Singapore (GovTech) aims to transform the delivery of Government digital services by taking an “outside-in” view, putting citizens and businesses at the heart of everything we do. We also develop the Smart Nation infrastructure and applications, and facilitate collaboration with citizens and businesses to co-develop technologies. Join us as we support Singapore’s vision of building a Smart Nation - a nation of possibilities empowered through info-communications technology and related engineering.

Page 28: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

28

SILVER SPONSORS

Sonatype

We’re on a Rugged DevOps mission to accelerate software innovation & quality while reducing waste & risk. Ask how you can achieve these goals with Nexus Software Supply Chain solutions: Nexus Repository Manager – your universal repo to manage all binaries, builds, & other deployment assets with toolchain integration. Nexus Firewall & Nexus Lifecycle – empower developers to choose the best component parts from the start with real-time component intelligence, automated policies & ongoing monitoring www.sonatype.com

Rapid7

Rapid7 is a leading provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cyber security. We combine our extensive experience in security data and analytics and deep insight into attacker behaviors and techniques to make sense of the wealth of data available to organizations about their IT environments and users. Our solutions empower organizations to prevent attacks by providing visibility into vulnerabilities and to rapidly detect compromises, respond to breaches, and correct the underlying causes of attacks. Trusted by more than 5,300 organizations across 100 countries, including 36% of the Fortune 1000. Visit www.rapid7.com.

Page 29: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

29

BRONZE SPONSORS

Vantage Point

Billions are spent globally every year on application security to contain the risks that developing insecure software places on businesses and their customers. The lack of security requirements, proper testing techniques, and security preparedness create long-term costs that compound over time. Vantage Point Security is dedicated to solving these challenges for our clients by building security into software development and CI/CD pipelines which results in strong alignment between development, security, and operations teams, delivers measurable productivity gains, reduces time to market, and provides a strong Return on Investment (ROI) for business stakeholders.

CONTACT US

If you have any questions about DevSecCon, drop us an email or visit our website for futher information:[email protected]

Page 30: CONFERENCE GUIDE - devseccon.comCONFERENCE GUIDE. 2 Join the conversation and share your DevSecCon experience with those who ... Thank you for choosing to spend your day with us at

VENUE MAP

RAFFLES CITY CONVENTION CENTRE LEVEL 4

Centre Atrium

Fairmont Ballroom

Stamford Ballroom

FAIRMONT SINGAPORE

BRAS BASAH ROAD

STAMFORD ROAD

SWISSOTEL THE STAMFORD

BEA

CH R

OA

D

NO

RTH

BR

IDG

E RO

AD

Stamford Meeting Rooms

Orchar

d

Room

South Atrium

North Atrium

Atrium

Ballro

om

Centre Atrium

SWISSOTEL THE STAMFORD

BEA

CHR

OA

D

Stamford Meeting Rooms

South Atrium

Lifts

Convention Foyer

Escalator

Orchar

d

Room

Atrium

Ballro

om

Atrium

Ballro

om

Foye

r