Presenter Photo

  • Network Segmentation: Grouping assets, including application and resource servers, into logical units that do not trust one another
  • Enforcing Appropriate Use of Credentials: IT organizations can leverage these controls to limit lateral movement in the case of a compromise and to provide a secure audit trail
  • Elimination of Hard-Coded Passwords: Removing hardcoded passwords in DevOps tool configurations, build scripts, code files, test builds, production builds, etc.

Please note this is a 90-minute session.