Sched.com Conference Mobile Apps
SnykCon 2020
has ended
Create Your Own Event
SnykCon 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Demo
Happy Hour
Keynote
Lightning Talk
Panel
Product
Talk
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Attendees
Search
Popular Events
#1
Beyond the Devops Handbook - What about devsecops?
#2
Blow up your Security: We are all Engineers
#3
SnykCon Welcome & Keynote
#4
How to Implement a DevSecOps Culture in a Large Enterprise - People, Processes, Tools
#5
CI/CD - Part 1 - How it Works
#6
CI/CD - Part 3 - CI/CD Best Practices
#7
User Story Threat Modeling: It's the DevSecOps Way
#8
How to deploy securely using Kubernetes & Terraform
#9
CI/CD - Part 2 - Advanced configuration options and plugins available.
#10
CI/CD - Jenkins
#11
Secure Code Warrior: Empowering developers to become the first line of defense by providing them with the skills and tools for secure coding
#12
Securing Kubernetes in a ever changing ecosystem
#13
From the Developer Desktop to Production
#14
CI/CD - Azure
#15
Whoops! I Committed It Again: Configuring Git to Prevent Accidental Commits
#16
The Developer Desktop - Part 1 - Open Source
#17
Test, Fix, and Monitor your Code Repositories
#18
Storytime - Secure Coding Libraries
#19
DevSecOps in containers and serverless.
#20
Snyk Open Source 101
#21
Security Culture: Why You Need One and How to Create It
#22
Managing issues with open source dependencies
#23
Securing Open Source pipeline using Plug-n-Play Scanning
#24
Need better security decisions? Get a better vulnerability database!
#25
Building safer containers with Snyk
#26
SCA & Enterprise Vulnerability Management
#27
Hackers don't wear hoodies, they wear capes
#28
The Impact of DevSecOps Quantified
#29
Secure by Design - coding patterns
#30
How to prioritize your vulnerabilities
#31
Securing Your Container Build Pipeline
#32
Connections and Intersections between Resilience Engineering and Security
#33
Patterns for secure container base image management
#34
Disclosing security vulnerabilities: If You’re Good at Something - Never Do it for Free
#35
Navigating DevOps Security journey at Scale using OWASP SAMM 2.0
#36
Are You a Security Sherpa, or a Security Bully?
#37
SnykCon Keynote & Fireside Chat with Adrian Ludwig, CISO, Atlassian
#38
DevSecOps for Platform Teams: A Discussion on Making It Easy to Do the Right Thing
#39
The Developer Desktop - Part 2 - Building Secure Containers with Snyk
#40
Deployment speed and security can live together
#41
Why are there no incentives for security in Open Source?
#42
Monitoring Container Images in Your Production Environment with Snyk
#43
Securing containers directly from Docker Desktop
#44
Snyk Infrastructure as Code - Testing via the CLI in your SDLC
#45
Do you accept the risk? Dynamic risk metrics in your environment.
#46
Why can't we simply add a button that does X?
#47
Host Like Your Planet Depended On It
#48
Snyk Infrastructure as Code - Monitoring via Source Code Management Integration
#49
Fixing the cost of fixing - the road to zero vulnerabilities
#50
Utilizing Dojos to Instill a Culture of DevSecOps
Popular by Type
All Types
Demo
Happy Hour
Keynote
Lightning Talk
Panel
Product
Talk
Popular by Day
All days
Wednesday, Oct 21
Thursday, Oct 22
Recently Active Attendees
Frederik Uyttersprot
Matt Jarvis
Vinay Prabhushankar
Christian Häussler
BS
BALASAHEB SALUNKE
PT
Pete Teale
SM
Shir Monether
Avishai Shafir
More →