SlideShare a Scribd company logo
Shift Left Security? Development
Does Not Want to Own It.
Shlomo Bielak George Davis
With: With:
TO USE YOUR COMPUTER'S AUDIO:
When the webinar begins, you will be connected to audio using
your computer's microphone and speakers (VoIP). A headset is
recommended.
Webinar will begin:
11:00 am, PST
TO USE YOUR TELEPHONE:
If you prefer to use your phone, you must select "Use Telephone"
after joining the webinar and call in using the numbers below.
United States: +1 (213) 929-4212
Access Code: 255-485-743
Audio PIN: Shown after joining the webinar
--OR--
2
For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for
exchanging digital information. Security is our entire focus, and it shows. This single-minded
passion has inspired our innovations that keep up with the bad guys despite a changing IT
landscape, riskier user behavior, and constantly evolving threats.
The depth of our experience remains unmatched. From the endpoint to the network to the
cloud, we’ve got you covered with a connected threat defense recognized by analysts,
customers, and industry gurus of all kinds. Our seamless protection for your mission-critical
environments doesn’t just happen. We have developed deep relationships and partnered with
industry leaders that you can trust. Our security is optimized for leading environments,
platforms, and applications that are needed to maximize protection and performance.
3
Click on the Questions panel to
interact with the presenters
https://www.informationmanagementtoday.com/frs/14625244/shift-left-security--
development-does-not-want-to-own-it-
4
About Shlomo Bielak
Shlomo, Benchmark Corp’s CTO is building expertise to shift global markets in understanding how to
make a transformational initiative scale without heroics. His experience and thought leadership
coupled with his talented engineering effectiveness department are creating never-before-seen
solutions for Multi-Cloud, DevOps, DevSecOps, and enabling continuous deployment to production for
the enterprise. A rich and responsive customer experience.
About George Davis
George is a DevOps and Cloud expert at Trend Micro. He works closely with Trend Micro’s
customers and partners to build layers of security into every step of their CI/CD pipeline. His
experience working in Dev, Test, Ops and Security helps customers to connect the dots, deliver
continuously, and iterate often while maintaining a healthy security posture. He primarily
focuses on Cloud One - Trend Micro's Security Services platform for the Cloud, securing
application runtime, container/server/serverless workloads and overall, better management of
governance, risk and compliance in the Cloud.
Applying Shift Left
Go Tri-Centric
George Davis – Trend
Shlomo Bielak – Benchmark Corp
Benchmark Confidential
THIS IS COMPLEX & FAILS
BUY ANOTHER COMPANY -
HARDER
THIS IS FUN
Dev-Centric Works!
ENTERPRISE
Sell ‘X’ to customers
STARTUP
Sell ‘X’ to customers
DELIVER CODE
FAST – CHANGE
NPS
Brand
SLA
Regulatory
/ Security
Code
drop
Code
drop
Code
drop
Code
drop
DELIVER CODE
FAST – CHANGE
Realities of Shift-Left
POC
POV
LAB
SUSTAIN
&
SCALE
7
DESIRE:
Commit Code
CORE COMPETENCY:
Coding
DESIRE:
Confident Steward of Prod
CORE COMPETENCY:
Operational Excellence
DESIRE:
Risk Managed
CORE COMPETENCY:
Governance
Developer / DevOps SRE / OPS Security Expert
Enterprise Personas - Today’s Approach?
8
THIS REQUIRES
SOLDIERS OF
FORTUNE
THE INTERACTION
MODEL IS
THREATENING
THE INTERACTION
MODEL IS POOR
Making Dev Own
Security/Ops
Requirements
Operations Does
Not Feel Valued
Security Is Seen As
Slowing Down Dev
Dev-Centric Shift left
RESPONSIBILITY ACCOUNTABILITY ACCOUNTABILITY
Security Is More Than Code
REVIEWING COMMON IT
SECURITY FRAMEWORKS
ISO
NIST
FEDRAMP
FISMA
PCI
CIS
Completed
with Code
√
Requires
Education
√
Requires
Audit
Process
Focus
Incident
Focused
√
√
√
√
√
√ √
√
√
√
√
√
SDLC
Component
√
√
√
√√
√
√
GOVERNANCE
ENGINEERING
MEASURE CX
RESPONSIVENESS
MODEL
GOVERNANCE
ENGINEERING
MEASURE CX
RESPONSIVENESS
MODEL
DeploymentPipeline
If(is_array($v[?]))
IN PRACTICE
Orchestration Pipeline – CI/CD
Governance Standards – Checking Tags and Values = KPI per service
Dev Workflow QA Workflow Staging Workflow Prod Workflow
Task Task Task Task Task Task Task Task
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
Tag/
Value
LAYERS OF PIPELINE GOVERNANCE STANDARDS
Regulatory (i.e. PCI)
Criticality or Service Tier (i.e. Platinum)
Quality (i.e. Code)
Stage (i.e. Development)
Target (i.e. Cloud Provider)
OUTPUT
KPIs – Compliance % per service
Auditability
Customer Loyalty /
Brand Quality /
Cost Savings
Human Toll (i.e. Fire fighting hours) Talent pool development
Security
In Practice
Pipeline Tasks
LAYERS OF PIPELINE TASKS
Measure – Integration
Pipeline Standards – Identify Tech Debt
Over time – Maturity & Standards Improve
Measure - Output
Unique Per Stage
Gate or Threshold or Track
Continuous Improvement of Standards
1 2
Evaluate - Release to Release Delta Values – Not starting value
Better Worse
13
THIS REQUIRES
COLLABORATION
THE INTERACTION
MODEL IS
INVOLVEMENT
THE INTERACTION
MODEL IS
RESPONSIVE
MAKING DEV OWN
CODE AGAIN
OPERATIONS HANDLES
DIFFICULT PRESSURES
- REDUCE WITH CODING
SECURITY BRINGS THEIR
BALLIWICK – MEASURE
CONFORMANCE AND FITNESS
Tri-Centric Shift Left – Governance Engineering
Operating Model
14
Q&A
George Davis
With: With:
CTO, Benchmark Corp.
Linkedin: in/ciscoconsultant
Website: benchmarkcorp.com
Shlomo Bielak
Sales Engineer, Trend Micro
Linkedin page: /in/georgedavisc/
Website: https://gdcrocx.github.io/
https://www.informationmanagementtoday.com/frs/14625244/shift-left-security--development-does-not-want-
to-own-it-
Thank you!

More Related Content

PPTX
What the DevOps - What is it, how did it come here, what does it feel like?
DOCX
SusanGerhartResume
PPTX
Secure development of code
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
PDF
5 principles-securing-devops-veracode-whitepaper
PPTX
Dev secops indonesia-devsecops as a service-Amien Harisen
DOCX
SaiBhaskar-Resume
PDF
Danfoss Shields Its Third Party Applications From Security Threats with patch...
What the DevOps - What is it, how did it come here, what does it feel like?
SusanGerhartResume
Secure development of code
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
5 principles-securing-devops-veracode-whitepaper
Dev secops indonesia-devsecops as a service-Amien Harisen
SaiBhaskar-Resume
Danfoss Shields Its Third Party Applications From Security Threats with patch...

What's hot (20)

PDF
Webinar – Risk-based adaptive DevSecOps
PDF
Devops certification training course
PDF
Devops certification training course
PPTX
Setting up a secure development life cycle with OWASP - seba deleersnyder
PDF
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
PDF
2017-07-12 GovLoop: New Era of Digital Security
PPTX
How to get the best out of DevSecOps - a security perspective
PPTX
Check point sandblast threat-emulation-customer-success-presentation
PDF
Preforce Slideshare Proof
PDF
Use our OWASP Threat Modeling Playbook to Improve your Product Security
PDF
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
PDF
Lessons from a recovering runtime application self protection addict
PDF
Security is our duty and we shall deliver it - White Paper
PDF
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
DOCX
Ritam Bose_Webspheresupport_unix
PDF
A Successful SAST Tool Implementation
PDF
Webinar–Building A Culture of Secure Programming in Your Organization
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PDF
HOW TO BECOME A RELEASE MANAGER IN 2021
PPTX
Industry 4.0 and security
Webinar – Risk-based adaptive DevSecOps
Devops certification training course
Devops certification training course
Setting up a secure development life cycle with OWASP - seba deleersnyder
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
2017-07-12 GovLoop: New Era of Digital Security
How to get the best out of DevSecOps - a security perspective
Check point sandblast threat-emulation-customer-success-presentation
Preforce Slideshare Proof
Use our OWASP Threat Modeling Playbook to Improve your Product Security
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
Lessons from a recovering runtime application self protection addict
Security is our duty and we shall deliver it - White Paper
TOP GOOGLE CHROME EXTENSIONS FOR ONLINE MARKETERS IN 2021
Ritam Bose_Webspheresupport_unix
A Successful SAST Tool Implementation
Webinar–Building A Culture of Secure Programming in Your Organization
SCS DevSecOps Seminar - State of DevSecOps
HOW TO BECOME A RELEASE MANAGER IN 2021
Industry 4.0 and security
Ad

Similar to Shift Left Security: Development Does Not Want to Own It. (20)

PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PDF
Agile Relevance in the age of Continuous Everything ....
PDF
The Challenge of Integrating Security Solutions with CI.pdf
PDF
Modern Security Operations - Building and leading modern SOC
PDF
Why Data Security Should Be a Priority in Your Software Development Strategy?
DOCX
PDF
Scaling AppSec through Education
PDF
Building Elastic into security operations
PDF
PDF
Operational security engineer architect
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
thei-cybersecurity-thiene-company-profile-eng.pdf
PPTX
The Teams Behind DevSecOps
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PDF
Active Directory in ICS: Lessons Learned From The Field
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PPTX
ABN AMRO DevSecOps Journey
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Agile Relevance in the age of Continuous Everything ....
The Challenge of Integrating Security Solutions with CI.pdf
Modern Security Operations - Building and leading modern SOC
Why Data Security Should Be a Priority in Your Software Development Strategy?
Scaling AppSec through Education
Building Elastic into security operations
Operational security engineer architect
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
thei-cybersecurity-thiene-company-profile-eng.pdf
The Teams Behind DevSecOps
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Active Directory in ICS: Lessons Learned From The Field
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ABN AMRO DevSecOps Journey
Ad

More from Aggregage (20)

PDF
Staying Ahead of UFLPA Enforcement: Best Practices for Retail Supply Chains
PDF
Making the Moment: The Art of Creating Events That Drive Results
PDF
Maximizing Profit And Productivity: The New Era Of AI-Powered Accounting
PPTX
From Rigid To Resilient: Why Enterprises Need Modular Commerce Now
PDF
How to Achieve High-Accuracy Results When Using LLMs
PDF
AI for Paralegals: Everything You Need to Know (and How to Use It Safely)
PPTX
Beyond the Blast: How to Pitch with Purpose and Build Lasting Media Relations...
PDF
Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape
PDF
Cash Flow Secrets Every Upskilled CPA Should Know
PDF
The Great Disruption: Leveraging AI To Better Your Benefits Strategy
PDF
AI in Marketing & Sales: Today’s Tools, Tomorrow’s Potential
PDF
Navigating Payroll Compliance: Future-Proofing Payroll in an Evolving Regulat...
PDF
AP Automation: The Competitive Advantage Your Business Needs
PPTX
Campaigns that Click: Practical Personalization Strategies to Boost ROI
PDF
The Constructor's Digital Transformation Playbook: Reducing Risk With Technology
PDF
The Future Of Finance: How To Manage Spend The Right Way
PDF
The Evolving Retailers Fulfillment Strategy: Meeting Demands with Agility
PDF
The New Way CPAs are Delivering Value: Aligning Automation with Client Success
PDF
The 2nd Generation of Innovation Management: A Survival Guide
PPTX
Case Closed: How to Optimize Your Legal Intake Process for Efficiency
Staying Ahead of UFLPA Enforcement: Best Practices for Retail Supply Chains
Making the Moment: The Art of Creating Events That Drive Results
Maximizing Profit And Productivity: The New Era Of AI-Powered Accounting
From Rigid To Resilient: Why Enterprises Need Modular Commerce Now
How to Achieve High-Accuracy Results When Using LLMs
AI for Paralegals: Everything You Need to Know (and How to Use It Safely)
Beyond the Blast: How to Pitch with Purpose and Build Lasting Media Relations...
Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape
Cash Flow Secrets Every Upskilled CPA Should Know
The Great Disruption: Leveraging AI To Better Your Benefits Strategy
AI in Marketing & Sales: Today’s Tools, Tomorrow’s Potential
Navigating Payroll Compliance: Future-Proofing Payroll in an Evolving Regulat...
AP Automation: The Competitive Advantage Your Business Needs
Campaigns that Click: Practical Personalization Strategies to Boost ROI
The Constructor's Digital Transformation Playbook: Reducing Risk With Technology
The Future Of Finance: How To Manage Spend The Right Way
The Evolving Retailers Fulfillment Strategy: Meeting Demands with Agility
The New Way CPAs are Delivering Value: Aligning Automation with Client Success
The 2nd Generation of Innovation Management: A Survival Guide
Case Closed: How to Optimize Your Legal Intake Process for Efficiency

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
ai tools demonstartion for schools and inter college
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Digital Strategies for Manufacturing Companies
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
top salesforce developer skills in 2025.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PTS Company Brochure 2025 (1).pdf.......
ai tools demonstartion for schools and inter college
Odoo POS Development Services by CandidRoot Solutions
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Upgrade and Innovation Strategies for SAP ERP Customers
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Digital Strategies for Manufacturing Companies
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Operating system designcfffgfgggggggvggggggggg
Softaken Excel to vCard Converter Software.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
top salesforce developer skills in 2025.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
How to Migrate SBCGlobal Email to Yahoo Easily
VVF-Customer-Presentation2025-Ver1.9.pptx
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Odoo Companies in India – Driving Business Transformation.pdf
2025 Textile ERP Trends: SAP, Odoo & Oracle

Shift Left Security: Development Does Not Want to Own It.

  • 1. Shift Left Security? Development Does Not Want to Own It. Shlomo Bielak George Davis With: With: TO USE YOUR COMPUTER'S AUDIO: When the webinar begins, you will be connected to audio using your computer's microphone and speakers (VoIP). A headset is recommended. Webinar will begin: 11:00 am, PST TO USE YOUR TELEPHONE: If you prefer to use your phone, you must select "Use Telephone" after joining the webinar and call in using the numbers below. United States: +1 (213) 929-4212 Access Code: 255-485-743 Audio PIN: Shown after joining the webinar --OR--
  • 2. 2 For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats. The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds. Our seamless protection for your mission-critical environments doesn’t just happen. We have developed deep relationships and partnered with industry leaders that you can trust. Our security is optimized for leading environments, platforms, and applications that are needed to maximize protection and performance.
  • 3. 3 Click on the Questions panel to interact with the presenters https://www.informationmanagementtoday.com/frs/14625244/shift-left-security-- development-does-not-want-to-own-it-
  • 4. 4 About Shlomo Bielak Shlomo, Benchmark Corp’s CTO is building expertise to shift global markets in understanding how to make a transformational initiative scale without heroics. His experience and thought leadership coupled with his talented engineering effectiveness department are creating never-before-seen solutions for Multi-Cloud, DevOps, DevSecOps, and enabling continuous deployment to production for the enterprise. A rich and responsive customer experience. About George Davis George is a DevOps and Cloud expert at Trend Micro. He works closely with Trend Micro’s customers and partners to build layers of security into every step of their CI/CD pipeline. His experience working in Dev, Test, Ops and Security helps customers to connect the dots, deliver continuously, and iterate often while maintaining a healthy security posture. He primarily focuses on Cloud One - Trend Micro's Security Services platform for the Cloud, securing application runtime, container/server/serverless workloads and overall, better management of governance, risk and compliance in the Cloud.
  • 5. Applying Shift Left Go Tri-Centric George Davis – Trend Shlomo Bielak – Benchmark Corp Benchmark Confidential
  • 6. THIS IS COMPLEX & FAILS BUY ANOTHER COMPANY - HARDER THIS IS FUN Dev-Centric Works! ENTERPRISE Sell ‘X’ to customers STARTUP Sell ‘X’ to customers DELIVER CODE FAST – CHANGE NPS Brand SLA Regulatory / Security Code drop Code drop Code drop Code drop DELIVER CODE FAST – CHANGE Realities of Shift-Left POC POV LAB SUSTAIN & SCALE
  • 7. 7 DESIRE: Commit Code CORE COMPETENCY: Coding DESIRE: Confident Steward of Prod CORE COMPETENCY: Operational Excellence DESIRE: Risk Managed CORE COMPETENCY: Governance Developer / DevOps SRE / OPS Security Expert Enterprise Personas - Today’s Approach?
  • 8. 8 THIS REQUIRES SOLDIERS OF FORTUNE THE INTERACTION MODEL IS THREATENING THE INTERACTION MODEL IS POOR Making Dev Own Security/Ops Requirements Operations Does Not Feel Valued Security Is Seen As Slowing Down Dev Dev-Centric Shift left RESPONSIBILITY ACCOUNTABILITY ACCOUNTABILITY
  • 9. Security Is More Than Code REVIEWING COMMON IT SECURITY FRAMEWORKS ISO NIST FEDRAMP FISMA PCI CIS Completed with Code √ Requires Education √ Requires Audit Process Focus Incident Focused √ √ √ √ √ √ √ √ √ √ √ √ SDLC Component √ √ √ √√ √ √
  • 11. GOVERNANCE ENGINEERING MEASURE CX RESPONSIVENESS MODEL DeploymentPipeline If(is_array($v[?])) IN PRACTICE Orchestration Pipeline – CI/CD Governance Standards – Checking Tags and Values = KPI per service Dev Workflow QA Workflow Staging Workflow Prod Workflow Task Task Task Task Task Task Task Task Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value Tag/ Value LAYERS OF PIPELINE GOVERNANCE STANDARDS Regulatory (i.e. PCI) Criticality or Service Tier (i.e. Platinum) Quality (i.e. Code) Stage (i.e. Development) Target (i.e. Cloud Provider) OUTPUT KPIs – Compliance % per service Auditability Customer Loyalty / Brand Quality / Cost Savings Human Toll (i.e. Fire fighting hours) Talent pool development
  • 12. Security In Practice Pipeline Tasks LAYERS OF PIPELINE TASKS Measure – Integration Pipeline Standards – Identify Tech Debt Over time – Maturity & Standards Improve Measure - Output Unique Per Stage Gate or Threshold or Track Continuous Improvement of Standards 1 2 Evaluate - Release to Release Delta Values – Not starting value Better Worse
  • 13. 13 THIS REQUIRES COLLABORATION THE INTERACTION MODEL IS INVOLVEMENT THE INTERACTION MODEL IS RESPONSIVE MAKING DEV OWN CODE AGAIN OPERATIONS HANDLES DIFFICULT PRESSURES - REDUCE WITH CODING SECURITY BRINGS THEIR BALLIWICK – MEASURE CONFORMANCE AND FITNESS Tri-Centric Shift Left – Governance Engineering Operating Model
  • 14. 14 Q&A George Davis With: With: CTO, Benchmark Corp. Linkedin: in/ciscoconsultant Website: benchmarkcorp.com Shlomo Bielak Sales Engineer, Trend Micro Linkedin page: /in/georgedavisc/ Website: https://gdcrocx.github.io/ https://www.informationmanagementtoday.com/frs/14625244/shift-left-security--development-does-not-want- to-own-it-