SlideShare a Scribd company logo
Company Confidential & Proprietary 1
The Challenges of
Scaling DevSecOps
Shiri Arad Ivtsan, Senior Product Manager
Company Confidential & Proprietary
The Agenda
2
▪ What is DevSecOps
▪ The Benefits
▪ What’s Holding us Back
▪ 5 Steps to Scaling DevSecOps
Company Confidential & Proprietary
The DevSecOps Approach
3
Company Confidential & ProprietaryCompany Confidential & Proprietary
▪ Integrate the security aspects and practices with the DevOps
processes
▪ Use agile methodologies to deliver small, secure pieces of code in
frequent releases
▪ Automate the security processes whenever possible
▪ The best response to the bottleneck effect of older security models
on the modern continuous delivery pipeline
4
DevSecOps: The DevOps & Security Culture
Company Confidential & Proprietary
The Common Way of Handling Security Vulnerabilities
Security teams
analyze and
prioritize
vulnerabilities
Sending emails or
opening
issues/tickets
Closing the loop
on resolution is
hard
Company Confidential & Proprietary
Company Confidential & Proprietary 6
6
The Benefits of DevSecOps
Company Confidential & ProprietaryCompany Confidential & Proprietary
▪ Cost Reduction
▪ Speed of delivery
▪ ‘Secure by design’
▪ Open discussion
7
The Business Benefits of DevSecOps
Company Confidential & Proprietary 8
The Operational Benefits of DevSecOps
▪ Versions are up-to-date
▪ Nearly “zero” re-work
▪ Early identification of vulnerabilities in code
▪ Enables a culture of constant iterative improvements
Company Confidential & Proprietary 9
What’s Holding us Back?
The Challenges in DevSecOps
Company Confidential & ProprietaryCompany Confidential & Proprietary
▪ Cultural and communication challenges
▪ Scaling is not easy
▪ Moving to the cloud
▪ Automation
10
The Security Challenges
Company Confidential & ProprietaryCompany Confidential & Proprietary
▪ Security awareness
▪ Familiarity with security tools
▪ Implementation into lifecycle
▪ Mindset
▪ Resolution and remediation
11
The Developer’s Challenges
Company Confidential & Proprietary 12
Start Driving DevSecOps in
Your Organization
The 5-steps Method
Company Confidential & ProprietaryCompany Confidential & Proprietary 13
Step 1: Know Your Goal
Baking Security Into
Existing Workflows
Company Confidential & ProprietaryCompany Confidential & Proprietary 14
Step 2: Identify the Processes
Company Confidential & ProprietaryCompany Confidential & Proprietary 15
Step 3: Determine Where to Automate
Build
Test
Detect
Issues
Remediate
Monitor
Company Confidential & ProprietaryCompany Confidential & Proprietary 16
Step 4: Shift Left Detection and Remediation
Company Confidential & ProprietaryCompany Confidential & Proprietary 17
Step 5: Improve, Continuously
▪ Continuous Integration
▪ Continuous Delivery
▪ Continuous Deployment
▪ Continuous Testing
▪ Continuous Improvement
Company Confidential & Proprietary
Company Confidential & Proprietary 18
18
Q & A
Company Confidential & Proprietary
Thank You!
19

More Related Content

What's hot (20)

PPTX
DevSecOps outline
Nickleus Jimenez
 
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 
PDF
DevSecOps The Evolution of DevOps
Michael Man
 
PDF
Dos and Don'ts of DevSecOps
Priyanka Aash
 
PDF
Tackling the Risks of Open Source Security: 5 Things You Need to Know
WhiteSource
 
PDF
DevSecOps - The big picture
DevSecOpsSg
 
PDF
The State of DevSecOps
DevOps Indonesia
 
PPTX
A journey from dev ops to devsecops
Veritis Group, Inc
 
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
PDF
DevOps or DevSecOps
Michelangelo van Dam
 
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
 
PDF
Empowering Financial Institutions to Use Open Source With Confidence
WhiteSource
 
PDF
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
DevOps.com
 
PDF
DevSecOps Everything You Need To Know
Centextech
 
PDF
Dev secops. Real experience.
Vitaly Balashov
 
PDF
DevSecOps for you Full Stack
Ron Nixon
 
PDF
Demystifying DevSecOps
Archana Joshi
 
PPTX
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
PDF
DevSecOps: Bringing security to the DevOps pipeline
Aarno Aukia
 
PDF
Zero to Ninety in Securing DevOps
DevSecOps Days
 
DevSecOps outline
Nickleus Jimenez
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 
DevSecOps The Evolution of DevOps
Michael Man
 
Dos and Don'ts of DevSecOps
Priyanka Aash
 
Tackling the Risks of Open Source Security: 5 Things You Need to Know
WhiteSource
 
DevSecOps - The big picture
DevSecOpsSg
 
The State of DevSecOps
DevOps Indonesia
 
A journey from dev ops to devsecops
Veritis Group, Inc
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
DevOps or DevSecOps
Michelangelo van Dam
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
 
Empowering Financial Institutions to Use Open Source With Confidence
WhiteSource
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
DevOps.com
 
DevSecOps Everything You Need To Know
Centextech
 
Dev secops. Real experience.
Vitaly Balashov
 
DevSecOps for you Full Stack
Ron Nixon
 
Demystifying DevSecOps
Archana Joshi
 
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
DevSecOps: Bringing security to the DevOps pipeline
Aarno Aukia
 
Zero to Ninety in Securing DevOps
DevSecOps Days
 

Similar to The Challenges of Scaling DevSecOps (20)

PDF
DevSecOps: Closing the Loop from Detection to Remediation
WhiteSource
 
PDF
Credencys_Staff_Augmentation_Processes
Shawn Rich
 
PPTX
ISACA Ireland Keynote 2015
Shannon Lietz
 
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
PDF
Agile Project Failures: Root Causes and Corrective Actions
TechWell
 
PPTX
DevSecCon Keynote
Shannon Lietz
 
PPTX
DevSecCon KeyNote London 2015
Shannon Lietz
 
PDF
Securing The Reality of Multiple Cloud Apps: Pandora's Story
CloudLock
 
PPTX
Disconnected Pipelines: The Missing Link
Eficode
 
PDF
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
DevOps.com
 
PPTX
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
PDF
Integrating Project Management with Service Management Best Practices Event B...
Google
 
PDF
SDLC & DevSecOps
Irina Kostina
 
PDF
Testaus 2014 -seminaari: Paul Gerrard. The Changing Role of Testers’.
Tieturi Oy
 
PDF
Testaus 2014: Paul Gerrard - The Changing Role of Testers'
Tieturi Oy
 
PPTX
Enterprise DevOps is not an oxymoron
Lee Eason
 
PPTX
S360 2015 dev_secops_program
Shannon Lietz
 
PPT
Phoenix User Group Slides
agilebuddy
 
PPTX
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
Turja Narayan Chaudhuri
 
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
DevSecOps: Closing the Loop from Detection to Remediation
WhiteSource
 
Credencys_Staff_Augmentation_Processes
Shawn Rich
 
ISACA Ireland Keynote 2015
Shannon Lietz
 
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Agile Project Failures: Root Causes and Corrective Actions
TechWell
 
DevSecCon Keynote
Shannon Lietz
 
DevSecCon KeyNote London 2015
Shannon Lietz
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
CloudLock
 
Disconnected Pipelines: The Missing Link
Eficode
 
Embrace DevSecOps and Enjoy a Significant Competitive Advantage!
DevOps.com
 
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
Integrating Project Management with Service Management Best Practices Event B...
Google
 
SDLC & DevSecOps
Irina Kostina
 
Testaus 2014 -seminaari: Paul Gerrard. The Changing Role of Testers’.
Tieturi Oy
 
Testaus 2014: Paul Gerrard - The Changing Role of Testers'
Tieturi Oy
 
Enterprise DevOps is not an oxymoron
Lee Eason
 
S360 2015 dev_secops_program
Shannon Lietz
 
Phoenix User Group Slides
agilebuddy
 
2022 DOI SKILup Days_Your Developers Decide Your Security Posture_Not Your Se...
Turja Narayan Chaudhuri
 
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
Ad

More from WhiteSource (20)

PDF
Securing Container-Based Applications at the Speed of DevOps
WhiteSource
 
PDF
The State of Open Source Vulnerabilities Management
WhiteSource
 
PDF
Open Source Security at Scale- The DevOps Challenge 
WhiteSource
 
PDF
Deep Dive into Container Security
WhiteSource
 
PDF
Fire alarms vs. Fire hoses: Keeping up with Dependencies
WhiteSource
 
PDF
Barriers to Container Security and How to Overcome Them
WhiteSource
 
PPTX
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
WhiteSource
 
PDF
Winning open source vulnerabilities without loosing your deveopers - Azure De...
WhiteSource
 
PDF
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
WhiteSource
 
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
WhiteSource
 
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
WhiteSource
 
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
WhiteSource
 
PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
WhiteSource
 
PDF
Top Open Source Licenses Explained
WhiteSource
 
PPTX
WhiteSource Webinar What's New With WhiteSource in December 2018
WhiteSource
 
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource
 
PPTX
The State of Open Source Vulnerabilities - A WhiteSource Webinar
WhiteSource
 
PDF
Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
WhiteSource
 
PPTX
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
WhiteSource
 
PPTX
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
WhiteSource
 
Securing Container-Based Applications at the Speed of DevOps
WhiteSource
 
The State of Open Source Vulnerabilities Management
WhiteSource
 
Open Source Security at Scale- The DevOps Challenge 
WhiteSource
 
Deep Dive into Container Security
WhiteSource
 
Fire alarms vs. Fire hoses: Keeping up with Dependencies
WhiteSource
 
Barriers to Container Security and How to Overcome Them
WhiteSource
 
5 Things Every CISO Needs To Know About Open Source Security - A WhiteSource ...
WhiteSource
 
Winning open source vulnerabilities without loosing your deveopers - Azure De...
WhiteSource
 
SAST (Static Application Security Testing) vs. SCA (Software Composition Anal...
WhiteSource
 
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
WhiteSource
 
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
WhiteSource
 
Automating Open Source Security: A SANS Review of WhiteSource
WhiteSource
 
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
WhiteSource
 
Top Open Source Licenses Explained
WhiteSource
 
WhiteSource Webinar What's New With WhiteSource in December 2018
WhiteSource
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource
 
The State of Open Source Vulnerabilities - A WhiteSource Webinar
WhiteSource
 
Find Out What's New With WhiteSource September 2018- A WhiteSource Webinar
WhiteSource
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
WhiteSource
 
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
WhiteSource
 
Ad

Recently uploaded (20)

PDF
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
PDF
NEW-Viral>Wondershare Filmora 14.5.18.12900 Crack Free
sherryg1122g
 
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PPTX
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
PPTX
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PDF
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PPTX
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
PDF
Add Background Images to Charts in IBM SPSS Statistics Version 31.pdf
Version 1 Analytics
 
PDF
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
PPTX
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PDF
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
PDF
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
PPTX
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
How to Hire AI Developers_ Step-by-Step Guide in 2025.pdf
DianApps Technologies
 
NEW-Viral>Wondershare Filmora 14.5.18.12900 Crack Free
sherryg1122g
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
ChiSquare Procedure in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
Add Background Images to Charts in IBM SPSS Statistics Version 31.pdf
Version 1 Analytics
 
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
Home Care Tools: Benefits, features and more
Third Rock Techkno
 

The Challenges of Scaling DevSecOps

  • 1. Company Confidential & Proprietary 1 The Challenges of Scaling DevSecOps Shiri Arad Ivtsan, Senior Product Manager
  • 2. Company Confidential & Proprietary The Agenda 2 ▪ What is DevSecOps ▪ The Benefits ▪ What’s Holding us Back ▪ 5 Steps to Scaling DevSecOps
  • 3. Company Confidential & Proprietary The DevSecOps Approach 3
  • 4. Company Confidential & ProprietaryCompany Confidential & Proprietary ▪ Integrate the security aspects and practices with the DevOps processes ▪ Use agile methodologies to deliver small, secure pieces of code in frequent releases ▪ Automate the security processes whenever possible ▪ The best response to the bottleneck effect of older security models on the modern continuous delivery pipeline 4 DevSecOps: The DevOps & Security Culture
  • 5. Company Confidential & Proprietary The Common Way of Handling Security Vulnerabilities Security teams analyze and prioritize vulnerabilities Sending emails or opening issues/tickets Closing the loop on resolution is hard
  • 6. Company Confidential & Proprietary Company Confidential & Proprietary 6 6 The Benefits of DevSecOps
  • 7. Company Confidential & ProprietaryCompany Confidential & Proprietary ▪ Cost Reduction ▪ Speed of delivery ▪ ‘Secure by design’ ▪ Open discussion 7 The Business Benefits of DevSecOps
  • 8. Company Confidential & Proprietary 8 The Operational Benefits of DevSecOps ▪ Versions are up-to-date ▪ Nearly “zero” re-work ▪ Early identification of vulnerabilities in code ▪ Enables a culture of constant iterative improvements
  • 9. Company Confidential & Proprietary 9 What’s Holding us Back? The Challenges in DevSecOps
  • 10. Company Confidential & ProprietaryCompany Confidential & Proprietary ▪ Cultural and communication challenges ▪ Scaling is not easy ▪ Moving to the cloud ▪ Automation 10 The Security Challenges
  • 11. Company Confidential & ProprietaryCompany Confidential & Proprietary ▪ Security awareness ▪ Familiarity with security tools ▪ Implementation into lifecycle ▪ Mindset ▪ Resolution and remediation 11 The Developer’s Challenges
  • 12. Company Confidential & Proprietary 12 Start Driving DevSecOps in Your Organization The 5-steps Method
  • 13. Company Confidential & ProprietaryCompany Confidential & Proprietary 13 Step 1: Know Your Goal Baking Security Into Existing Workflows
  • 14. Company Confidential & ProprietaryCompany Confidential & Proprietary 14 Step 2: Identify the Processes
  • 15. Company Confidential & ProprietaryCompany Confidential & Proprietary 15 Step 3: Determine Where to Automate Build Test Detect Issues Remediate Monitor
  • 16. Company Confidential & ProprietaryCompany Confidential & Proprietary 16 Step 4: Shift Left Detection and Remediation
  • 17. Company Confidential & ProprietaryCompany Confidential & Proprietary 17 Step 5: Improve, Continuously ▪ Continuous Integration ▪ Continuous Delivery ▪ Continuous Deployment ▪ Continuous Testing ▪ Continuous Improvement
  • 18. Company Confidential & Proprietary Company Confidential & Proprietary 18 18 Q & A
  • 19. Company Confidential & Proprietary Thank You! 19