SlideShare a Scribd company logo
The Changing Landscape of
Information Security
1
Applications
DevSecOps
Hybrid IT
Automation
Viren Mantri
All views expressed here are entirely mine, do not represent those of my current and past employers.
2
Backdrop
• Criminals Profit
• Espionage Intelligence
• Warriors Disruption
• Terrorists Ideology
• The question is
not whether but when?
Cyber attacks
Current era
4
Rigidity à Agility
5
DevSecOps – on a lighter note
No offence
meant J
6
DevSecOps – on a serious note
o Baking security in design
o From BRD/FSD to weekly huddles and feature releases
o Externalizing authentication and authorization
o Using encryption and tokenization for data protection
o Building resilience to vulnerabilities and exploits
o Educating developers on security
7
DevOps ToolSet
• Developer scan
• Build scan
• Infrastructure
• Automation
• Vulnerability reporting
• Remediation workflow
• Risk assessment
• Security dashboard
SCM Build Deploy Cloud OS Security
Repo Package Release IaaS VM Scanning
CI Provision Test PaaS App/Web VA
Workflow Config Monitoring SaaS DB PenTest
8
Traceability is key
9
Hybrid IT
• Growing acceptance
• Initial euphoria over
(in)security mellowed
• Cloud providers
challenging On-Prem
• Need to support legacy
while striving to be agile
• Agility flexes rigidity,
breaks down silos
10
Automation
• The right level eliminates inefficiencies
• Delivers economies of scale
• Ensures repeatable processes
11
Matured teams
• Recognize Information security is everyone’s business
• Develop a blueprint providing clarity and rationale
• Know why we are doing what we are doing
12
Questions
vm@greyorbits.com

More Related Content

PDF
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
PDF
Behavior-Based Defense in ICS
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PDF
Securing the container DevOps pipeline by William Henry
PPTX
TRISIS in Perspective
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PPTX
The road goes ever on and on by Ciaran Conliffe
PPTX
The Four Types of Threat Detection and Use Cases in Industrial Security
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
Behavior-Based Defense in ICS
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
Securing the container DevOps pipeline by William Henry
TRISIS in Perspective
Automating Open Source Security: A SANS Review of WhiteSource
The road goes ever on and on by Ciaran Conliffe
The Four Types of Threat Detection and Use Cases in Industrial Security

What's hot (20)

PDF
Threat Modeling workshop by Robert Hurlbut
PDF
Managing third party libraries
PDF
Trisis in Perspective: Implications for ICS Defenders
PPTX
The How and Why of Container Vulnerability Management
PDF
Security Starts at the Endpoint
PDF
Why does security matter for devops by Caroline Wong
PPTX
Secure application deployment in Apache CloudStack
PDF
Dev week cloud world conf2021
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Security in the Age of Open Source
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PPTX
The path of secure software by Katy Anton
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
PPTX
Secure application deployment in the age of continuous delivery
PDF
Renato Rodrigues - Security in the wild
PDF
Outpost24 webinar - A day in the life of an information security professional
PDF
Myths and Misperceptions of Open Source Security
PDF
Vulnerability Management – Opportunities and Challenges!
PDF
Secure Application Development in the Age of Continuous Delivery
Threat Modeling workshop by Robert Hurlbut
Managing third party libraries
Trisis in Perspective: Implications for ICS Defenders
The How and Why of Container Vulnerability Management
Security Starts at the Endpoint
Why does security matter for devops by Caroline Wong
Secure application deployment in Apache CloudStack
Dev week cloud world conf2021
Security in the age of open source - Myths and misperceptions
Security in the Age of Open Source
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
The path of secure software by Katy Anton
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
Managing Open Source in Application Security and Software Development Lifecycle
Secure application deployment in the age of continuous delivery
Renato Rodrigues - Security in the wild
Outpost24 webinar - A day in the life of an information security professional
Myths and Misperceptions of Open Source Security
Vulnerability Management – Opportunities and Challenges!
Secure Application Development in the Age of Continuous Delivery
Ad

Viewers also liked (20)

PPTX
Cyber Security Landscape: Changes, Threats and Challenges
PDF
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
PDF
DevSecOps in Baby Steps
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PDF
DevSecOps - The big picture
PDF
Integrating DevOps and Security
PPTX
DEVSECOPS: Coding DevSecOps journey
PDF
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
PDF
PCI DSS Data Security Compliance Program Overview
PPTX
Vendor Landscape: Security Information and Event Management
PDF
IT Security landscape and the latest threats and trends
PPTX
Vendor Landscape: Email Security Gateway
PPTX
Cyber Security Lessons from the NSA
PDF
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PDF
Jakob Holderbaum - Managing Shared secrets using basic Unix tools
PDF
Dev seccon london 2016 intelliment security
PPT
DevSecOps Singapore introduction
PDF
RoboCop: Bringing Law and Order to CI/CD
PPT
DevSecOps SG Introduction - August Meetup
Cyber Security Landscape: Changes, Threats and Challenges
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
DevSecOps in Baby Steps
Application Security at DevOps Speed - DevOpsDays Singapore 2016
DevSecOps - The big picture
Integrating DevOps and Security
DEVSECOPS: Coding DevSecOps journey
DevSecCon Asia 2017 Fabian Lim: DevSecOps in the government
PCI DSS Data Security Compliance Program Overview
Vendor Landscape: Security Information and Event Management
IT Security landscape and the latest threats and trends
Vendor Landscape: Email Security Gateway
Cyber Security Lessons from the NSA
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
The Cyber Security Landscape: An OurCrowd Briefing for Investors
Jakob Holderbaum - Managing Shared secrets using basic Unix tools
Dev seccon london 2016 intelliment security
DevSecOps Singapore introduction
RoboCop: Bringing Law and Order to CI/CD
DevSecOps SG Introduction - August Meetup
Ad

Similar to The Changing Landscape of Information Security (20)

PPTX
SCS DevSecOps Seminar - State of DevSecOps
PDF
The What, Why, and How of DevSecOps
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PDF
Deepfence.pdf
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
PDF
The Principles of Secure Development - BSides Las Vegas 2009
PDF
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
PPTX
DevSecOps : an Introduction
PPTX
Started In Security Now I'm Here
PPTX
Defining DevSecOps
PDF
Pentest is yesterday, DevSecOps is tomorrow
PPTX
Starting your Career in Information Security
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
The New Security Practitioner
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PPTX
Moving Security to the Left
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PDF
The Intersection of Security & DevOps
PPTX
State of DevSecOps - DevSecOpsDays 2019
PDF
The Intersection of Security & DevOps
SCS DevSecOps Seminar - State of DevSecOps
The What, Why, and How of DevSecOps
DevSecCon London 2017: when good containers go bad by Tim Mackey
Deepfence.pdf
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
The Principles of Secure Development - BSides Las Vegas 2009
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
DevSecOps : an Introduction
Started In Security Now I'm Here
Defining DevSecOps
Pentest is yesterday, DevSecOps is tomorrow
Starting your Career in Information Security
What Every Developer And Tester Should Know About Software Security
The New Security Practitioner
Why Security Engineer Need Shift-Left to DevSecOps?
Moving Security to the Left
Outpost24 webinar: Turning DevOps and security into DevSecOps
The Intersection of Security & DevOps
State of DevSecOps - DevSecOpsDays 2019
The Intersection of Security & DevOps

Recently uploaded (20)

PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
TLE Review Electricity (Electricity).pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
1 - Historical Antecedents, Social Consideration.pdf
Chapter 5: Probability Theory and Statistics
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Heart disease approach using modified random forest and particle swarm optimi...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Zenith AI: Advanced Artificial Intelligence
Web App vs Mobile App What Should You Build First.pdf
A novel scalable deep ensemble learning framework for big data classification...
A comparative study of natural language inference in Swahili using monolingua...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Programs and apps: productivity, graphics, security and other tools
TLE Review Electricity (Electricity).pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

The Changing Landscape of Information Security

  • 1. The Changing Landscape of Information Security 1 Applications DevSecOps Hybrid IT Automation Viren Mantri All views expressed here are entirely mine, do not represent those of my current and past employers.
  • 2. 2 Backdrop • Criminals Profit • Espionage Intelligence • Warriors Disruption • Terrorists Ideology • The question is not whether but when? Cyber attacks
  • 5. 5 DevSecOps – on a lighter note No offence meant J
  • 6. 6 DevSecOps – on a serious note o Baking security in design o From BRD/FSD to weekly huddles and feature releases o Externalizing authentication and authorization o Using encryption and tokenization for data protection o Building resilience to vulnerabilities and exploits o Educating developers on security
  • 7. 7 DevOps ToolSet • Developer scan • Build scan • Infrastructure • Automation • Vulnerability reporting • Remediation workflow • Risk assessment • Security dashboard SCM Build Deploy Cloud OS Security Repo Package Release IaaS VM Scanning CI Provision Test PaaS App/Web VA Workflow Config Monitoring SaaS DB PenTest
  • 9. 9 Hybrid IT • Growing acceptance • Initial euphoria over (in)security mellowed • Cloud providers challenging On-Prem • Need to support legacy while striving to be agile • Agility flexes rigidity, breaks down silos
  • 10. 10 Automation • The right level eliminates inefficiencies • Delivers economies of scale • Ensures repeatable processes
  • 11. 11 Matured teams • Recognize Information security is everyone’s business • Develop a blueprint providing clarity and rationale • Know why we are doing what we are doing