Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Introduction
00:00 • 2min
Security as Code - What's Next?
01:30 • 2min
Getting Up Sa Havste Dev Sycops Emerge
03:14 • 2min
Devops Security as Code
04:49 • 2min
Applied Security in the Cubernets Ecosystem?
06:51 • 2min
The Tools Are the Easy Thing, Right?
09:00 • 2min
Security as Code Cycle in a Multi Cloud Environment?
11:10 • 4min
Securing the Salphur Supply Chain
14:51 • 2min
Cobernetties - The Engine Behind That
16:52 • 2min
Shifting Security Left
19:11 • 2min
Getting Security Professionals to Integrate Into Your Workflows
21:26 • 2min
Supply Chain Security - What's the New Weakest Link?
23:04 • 2min
Identity and Access Management Misconfiguration
24:44 • 3min
Is Misconfiguration a Mistake?
27:16 • 2min
How Do You Synchronize Interstructures Code With Security?
28:49 • 2min
DevOps - Is the S C M the Entry Point?
30:26 • 3min