Managing issues wi...
From the Developer...
CI/CD - Part 1 - H...
Protecting your bu...
Demos Rapid7
Atlassian & Snyk,...
Secure Code Warrio...
CI/CD - Jenkins
CI/CD - Azure
CI/CD - Part 2 - A...
CI/CD - Part 3 - C...
Test, Fix, and Mon...
Managing Open Sour...
Stackhawk Demo
Datadog Security M...
Beyond the Devops...
Blow up your Secur...
How did the Depart...
SnykCon Welcome & Keynote 15:30 - 16:30
Exit Stage Left: Eradicating Sec... 17:15 - 17:45
Storytime - Secure...
Whoops! I Committe...
Customer Awards
Multi-threaded Drum & Bass : Live Coding Music with Sonic Pi 20:50 - 21:50
How to Implement a DevSecOps Cul... 17:55 - 18:25
Security Culture: Why You Need O... 18:25 - 18:55
DevSecOps in containers and serv... 18:55 - 19:25
Sour Mint - The case of maliciou... 19:40 - 20:10
Hackers don't wear hoodies, they... 20:10 - 20:40
Snyk Open Source 101 17:55 - 18:25
Need better security decisions?... 18:25 - 18:55
Building safer containers with S... 18:55 - 19:25
How to deploy securely using Kub... 19:40 - 20:10
License to chill: Staying licens... 20:10 - 20:40
SCA & Enterprise Vulnerability M... 17:55 - 18:25
User Story Threat Modeling: It's... 18:25 - 18:55
Lighting the Flare: container sc... 18:55 - 19:25
Securing Open Source pipeline us... 19:40 - 20:10
Securing Kubernetes in a ever ch... 20:10 - 20:40
The Developer Desk...
Securing Your Cont...
Monitoring Contain...
Snyk Infrastructur...
Governance - Secur...
Organizing Your Pr...
Utilizing the Snyk...
Successfully Rolli...
CircleCi Demo
Open Source Visibi...
The Impact of DevS...
Connections and In...
Host Like Your Pla...
SnykCon Keynote & Fireside Chat with Adrian Ludwig, CISO, Atlass... 15:30 - 16:30
Laugh Lunch Learn 16:40 - 17:10
From Control to Collaboration: D... 17:15 - 17:45
Disclosing securit...
Why can't we simpl...
Are You a Security...
Enable Visibility for SecOps Whi... 17:55 - 18:25
Why are there no incentives for... 18:25 - 18:55
DevSecOps for Platform Teams: A... 18:55 - 19:25
Utilizing Dojos to Instill a Cul... 19:40 - 20:10
Navigating DevOps Security journ... 20:10 - 20:40
How to prioritize your vulnerabi... 17:55 - 18:25
Securing containers directly fro... 18:25 - 18:55
Fixing the cost of fixing - the... 18:55 - 19:25
Ain’t no mountain high enough: S... 19:40 - 20:10
Patterns for secure container ba... 20:10 - 20:40
Deployment speed and security ca... 17:55 - 18:25
Secure by Design - coding patter... 18:25 - 18:55
Do you accept the risk? Dynamic... 18:55 - 19:25
Securing Front-end Attack Surfac... 19:40 - 20:10
Product Security Automation at A... 20:10 - 20:40