Secrets and sensitive data are a given in the development world. You can’t write a secure app without taking into account how to gather and validate passwords or prevent unauthorized access. While DevOps has streamlined release cycles, there is a tendency for security to be shortchanged in the process. Critical API access tokens, credentials, and cryptographic keys are often inadequately protected and even exposed in code.
Enter secrets management and privileged access management (PAM).
In this upcoming webinar, join Cybersecurity CTO and security architect, Diana Kelley, who will cover common security mistakes present in deployed DevOps applications and detail how to prevent them by using security hygiene in the DevSecOps lifecycle, proper management of secrets, and implementation of privileged access.
Diana will also touch on the following challenges (as well as solutions for them):
- The Golden Login problem is back
- Containers don’t contain
- Interoperability isn’t a given
Diana Kelley’s security career spans over 30 years. She is Co-Founder and CTO of SecurityCurve and donates much of her time to volunteer work in the cybersecurity community, including serving on the ACM Ethics & Plagiarism Committee, as CTO and Board member at Sightline Security, Board member and Inclusion Working Group champion at WiCyS, Cybersecurity Committee Advisor at CompTIA, and RSAC US Program Committee.
Diana produces the #MyCyberWhy series, hosts BrightTALK’s The Security Balancing Act, and is a Principal Consulting Analyst with TechVision Research and a member of The Analyst Syndicate.
She was the Cybersecurity Field CTO for Microsoft, Global Executive Security Advisor at IBM Security, GM at Symantec, VP at Burton Group (now Gartner), and a Manager at KPMG.
She is a sought after keynote speaker, the co-author of the book Cryptographic Libraries for Developers, has been a lecturer at Boston College's Masters program in cybersecurity, the EWF 2020 Executive of the Year, and one of Cybersecurity Ventures 100 Fascinating Females Fighting Cybercrime.
Jason has been building business applications and software products going on 15 years. With a background in Development, QA, Product Management, and wearing as many hats as possible at a medical startup, he has extensive experience with the entire product lifecycle. Jason has been working on BeyondTrust products for the past 7 years and has a primary focus on our Privileged Password and Session Management solutions.