SlideShare a Scribd company logo
As DevExec AreYou Doing Enough For Security?
Archana Joshi
Head –Transformation, LTI
Note:The views expressed in the presentation are solely of the presenter and do not represent those of the company /clients she is associated with
2
Let’s us meet the characters in our story
CEO CIO Legal Director
InfoSec Director Dev Director
3
…. And ask them the same question
What are you doing about cyber security?
CEO CIO Legal Director
InfoSec Director Dev Director
One of the top agenda
Proactive investments
Being secure is our culture
Strengthening
Cloud Security &
Application Security
Compliance checks
Investing in Digital Forensics
Security lapse liability
3rd party coverage
DevSecOps
Risk based DAST, SAST
4
Alert !!!!
Security Breach !!!!
Root Cause: Application using an open source utility was hacked
5
Now ask them the same question
How can we prevent such breach in future?
CEO CIO Legal Director
InfoSec Director Dev Director
I am setting up a committee with
external experts to help us with next
steps
My team needs to come together
It’s not just us – we have partners too
We need to work together
I should provide stringent security norms
We need to work together
I don’t understand this focus for
opensource
We need to work together
My app team faces the brunt.There are
networks too
We need to work together
6
2 months after the incident…. ask them the same question
How are you measuring effectiveness of cyber security
CEO CIO Legal Director
InfoSec Director Dev Director
I get weekly report on any breaches
We are also running an awareness
campaign
Mean time to receover from security
Kubernetes cluster monitoring
% Adoption of DevSecOps
No. of builds to production with security
clearances
Risk assessment profile
No. of third party assessments meeting
the legal guidelines
No. of security compliances defects
No. of developers undergone secure
coding practices session
7
Is there a better way to handle this?
Can we truly achieve “continuous security”
8
Infrastructure
Applications
Data
Compliance
StaticTesting
DynamicTesting
Network Security
Endpoint Security
Cloud Security
Data Encryption
Access Credentials
Loss Prevention
Cloud
Data
Regula
-tions
Open
Source
/ 3rd
Party
9
Security Pod & Roles
CISO – CIO pair
Extreme Automation
Inbuilt Dev Practices
Integrated OKR and metrics
Follow the motto of Centralize – But Decentralize
10
Security Pod & Roles
Security Architect
Security Ambassador / Product Mgr
SRE with security focus
CISO – CIO pair
Common security governance
Active Legal involvement
Extreme Automation
Open source tagging via pipeline
Operations monitoring includes security parameters
Inbuilt Dev Practices
Security as a code
Secure coding insights via AI interventions
Integrated OKR and metrics
Threshold setting for central involvement
Security Debt as part of sprint goals
Follow the motto of Centralize – But Decentralize
11
Security is at the heart of
success of development
THANK YOU
https://www.linkedin.com/in/arcjoshi
Note:The views expressed in the presentation are solely of the presenter and do not represent those of the company /clients she is associated with

More Related Content

PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
PPTX
Practical DevSecOps Using Security Instrumentation
PDF
Demystifying DevSecOps
PPTX
Introduction to DevSecOps
PPTX
A journey from dev ops to devsecops
PDF
PIACERE - DevSecOps Automated
PPTX
DevSecOps outline
PPTX
DEVSECOPS: Coding DevSecOps journey
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Practical DevSecOps Using Security Instrumentation
Demystifying DevSecOps
Introduction to DevSecOps
A journey from dev ops to devsecops
PIACERE - DevSecOps Automated
DevSecOps outline
DEVSECOPS: Coding DevSecOps journey

What's hot (19)

PPTX
DevSecOps
PDF
Introduction to DevSecOps
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PPTX
Integrate Security into DevOps - SecDevOps
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
PPTX
DevSecOps : an Introduction
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
The Challenges of Scaling DevSecOps
PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
PDF
DevSecOps Everything You Need To Know
PDF
Open Source Security at Scale- The DevOps Challenge 
PDF
DevSecOps, The Good, Bad, and Ugly
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PDF
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
PDF
DevSecOps: Minimizing Risk, Improving Security
PPTX
DevSecOps without DevOps is Just Security
PDF
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
PDF
DevSecOps for you Full Stack
PDF
Automating Security Compliance on AWS with DevSecOps
DevSecOps
Introduction to DevSecOps
Why Security Engineer Need Shift-Left to DevSecOps?
Integrate Security into DevOps - SecDevOps
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps : an Introduction
Bringing Security Testing to Development: How to Enable Developers to Act as ...
The Challenges of Scaling DevSecOps
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
DevSecOps Everything You Need To Know
Open Source Security at Scale- The DevOps Challenge 
DevSecOps, The Good, Bad, and Ugly
Application Security at DevOps Speed - DevOpsDays Singapore 2016
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
DevSecOps: Minimizing Risk, Improving Security
DevSecOps without DevOps is Just Security
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
DevSecOps for you Full Stack
Automating Security Compliance on AWS with DevSecOps
Ad

Similar to Dev week cloud world conf2021 (20)

PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PDF
DevSecOps What Why and How
PPTX
S360 2015 dev_secops_program
PPTX
Secure DevOps - Evolution or Revolution?
PDF
The 10 Most Influential People In Cyber Security, 2024.pdf
PDF
CIA Trifecta ISACA Boise 2016 Watson
PPTX
CISO's first 100 days
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
PDF
DevOps: Lead, Follow or Get Out of the Way - A CISO Perspective
PDF
Security's DevOps Transformation
PPTX
DevSecOps Best Practices-Safeguarding Your Digital Landscape
PPTX
DevSecOps-Explained-converted.pptx
PDF
Building Security Teams
DOCX
10 things to get right for successful dev secops
PPTX
State of DevSecOps - DevSecOpsDays 2019
PPTX
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
PPTX
A guide to Sustainable Cyber Security
Succeeding-Marriage-Cybersecurity-DevOps final
Outpost24 webinar: Turning DevOps and security into DevSecOps
DevSecOps What Why and How
S360 2015 dev_secops_program
Secure DevOps - Evolution or Revolution?
The 10 Most Influential People In Cyber Security, 2024.pdf
CIA Trifecta ISACA Boise 2016 Watson
CISO's first 100 days
Protecting Agile Transformation through Secure DevOps (DevSecOps)
DevOps: Lead, Follow or Get Out of the Way - A CISO Perspective
Security's DevOps Transformation
DevSecOps Best Practices-Safeguarding Your Digital Landscape
DevSecOps-Explained-converted.pptx
Building Security Teams
10 things to get right for successful dev secops
State of DevSecOps - DevSecOpsDays 2019
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
A guide to Sustainable Cyber Security
Ad

More from Archana Joshi (13)

PPTX
Security in Product Aligned IT
PDF
Harness the power of 3 Devops, Cloud, AI
PDF
Agile India 2019 Propel by Scaling Innovation
PDF
Container based CI Solution that creates build infrastructure on demand
PDF
Being Agile in an IT Services Industry
PDF
Agility with Microservices and DevOps
PDF
Applying lean techniques in software
PDF
How do i know agile is working for me or not an executives dilemma
PDF
Minimum viable product_to_deliver_business_value_v0.4
PDF
Archana Joshi Aug 2013 Kanban Spin Pune
PDF
Archana Joshi Agile2010 Agile at services organization
PDF
Archana Joshi Agile2010 Make your retrospectives fun and effective
PDF
Archana Joshi Testing in agile is it easier said than done
Security in Product Aligned IT
Harness the power of 3 Devops, Cloud, AI
Agile India 2019 Propel by Scaling Innovation
Container based CI Solution that creates build infrastructure on demand
Being Agile in an IT Services Industry
Agility with Microservices and DevOps
Applying lean techniques in software
How do i know agile is working for me or not an executives dilemma
Minimum viable product_to_deliver_business_value_v0.4
Archana Joshi Aug 2013 Kanban Spin Pune
Archana Joshi Agile2010 Agile at services organization
Archana Joshi Agile2010 Make your retrospectives fun and effective
Archana Joshi Testing in agile is it easier said than done

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Digital Strategies for Manufacturing Companies
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
ai tools demonstartion for schools and inter college
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
System and Network Administraation Chapter 3
PPTX
Materi_Pemrograman_Komputer-Looping.pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
DOCX
The Five Best AI Cover Tools in 2025.docx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PTS Company Brochure 2025 (1).pdf.......
Digital Strategies for Manufacturing Companies
Operating system designcfffgfgggggggvggggggggg
How Creative Agencies Leverage Project Management Software.pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Upgrade and Innovation Strategies for SAP ERP Customers
Softaken Excel to vCard Converter Software.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
L1 - Introduction to python Backend.pptx
2025 Textile ERP Trends: SAP, Odoo & Oracle
How to Migrate SBCGlobal Email to Yahoo Easily
ai tools demonstartion for schools and inter college
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
System and Network Administraation Chapter 3
Materi_Pemrograman_Komputer-Looping.pptx
Design an Analysis of Algorithms II-SECS-1021-03
The Five Best AI Cover Tools in 2025.docx
Odoo POS Development Services by CandidRoot Solutions
Which alternative to Crystal Reports is best for small or large businesses.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...

Dev week cloud world conf2021

  • 1. As DevExec AreYou Doing Enough For Security? Archana Joshi Head –Transformation, LTI Note:The views expressed in the presentation are solely of the presenter and do not represent those of the company /clients she is associated with
  • 2. 2 Let’s us meet the characters in our story CEO CIO Legal Director InfoSec Director Dev Director
  • 3. 3 …. And ask them the same question What are you doing about cyber security? CEO CIO Legal Director InfoSec Director Dev Director One of the top agenda Proactive investments Being secure is our culture Strengthening Cloud Security & Application Security Compliance checks Investing in Digital Forensics Security lapse liability 3rd party coverage DevSecOps Risk based DAST, SAST
  • 4. 4 Alert !!!! Security Breach !!!! Root Cause: Application using an open source utility was hacked
  • 5. 5 Now ask them the same question How can we prevent such breach in future? CEO CIO Legal Director InfoSec Director Dev Director I am setting up a committee with external experts to help us with next steps My team needs to come together It’s not just us – we have partners too We need to work together I should provide stringent security norms We need to work together I don’t understand this focus for opensource We need to work together My app team faces the brunt.There are networks too We need to work together
  • 6. 6 2 months after the incident…. ask them the same question How are you measuring effectiveness of cyber security CEO CIO Legal Director InfoSec Director Dev Director I get weekly report on any breaches We are also running an awareness campaign Mean time to receover from security Kubernetes cluster monitoring % Adoption of DevSecOps No. of builds to production with security clearances Risk assessment profile No. of third party assessments meeting the legal guidelines No. of security compliances defects No. of developers undergone secure coding practices session
  • 7. 7 Is there a better way to handle this? Can we truly achieve “continuous security”
  • 8. 8 Infrastructure Applications Data Compliance StaticTesting DynamicTesting Network Security Endpoint Security Cloud Security Data Encryption Access Credentials Loss Prevention Cloud Data Regula -tions Open Source / 3rd Party
  • 9. 9 Security Pod & Roles CISO – CIO pair Extreme Automation Inbuilt Dev Practices Integrated OKR and metrics Follow the motto of Centralize – But Decentralize
  • 10. 10 Security Pod & Roles Security Architect Security Ambassador / Product Mgr SRE with security focus CISO – CIO pair Common security governance Active Legal involvement Extreme Automation Open source tagging via pipeline Operations monitoring includes security parameters Inbuilt Dev Practices Security as a code Secure coding insights via AI interventions Integrated OKR and metrics Threshold setting for central involvement Security Debt as part of sprint goals Follow the motto of Centralize – But Decentralize
  • 11. 11 Security is at the heart of success of development
  • 12. THANK YOU https://www.linkedin.com/in/arcjoshi Note:The views expressed in the presentation are solely of the presenter and do not represent those of the company /clients she is associated with