DiscoverSoftware Security: Industry Influencers
Software Security: Industry Influencers
Claim Ownership

Software Security: Industry Influencers

Author: Mark Miller, Trusted Software Alliance

Subscribed: 2Played: 333
Share

Description

50 in 50 is a series of interviews, talking with open source security experts from around the world as we work together to create to manage the security of open source applications.
31 Episodes
Reverse
Matthew McCullough is the director of field services at GitHub. While at DevNexus 2015 in Atlanta earlier this month, Matthew and I sat down with Brian Fox, VP of Product Management at Sonatype. The discussion was wide ranging, covering everything from the prevelance of Java on GitHub to the patterns for enterprise software development through the use of the DevOps tool chain through polyglot programming becoming the norm. Part of the discussion talks about how Nexus and GitHub work together to create a complimentary tool set for the contemporary programmer. Music for today's broadcast is provided by The George Cole Quintet.
"Typically, people divide the (software) world into cost, schedule, functionality, quality. In my experience, almost everyone when they talk 'quality', are excluding security." -- David Wheeler David Wheeler is a project leader at the Institute for Defense Analyses. He also teaches a graduate classon software security at George Mason University. David has a unique view of security's role as part of the software development life cycle. In this wide ranging discussion, we talk about the current state of security, how people are trained (or not trained) to handle security as part of the development process, and what the future looks like for the security industry. "We've already moved to a mostly componentized world. We now have to understand that we have to update the components as we go along. We need to put tools in the customer's hands so they can quickly identify, 'Wow! You're using a library with 300 known vulnerabilities. I'm not going to use your system until you get your act together.'" -- David Wheeler About David A. Wheeler My professional interests are in improving software development practices for higher-risk software systems (i.e., ones which must be secure, large, and/or safety-critical). My specialties include writing secure programs, vulnerability assessment, open standards, open source software / free software (OSS/FS), Internet/web standards and technologies, and POSIX. http://www.dwheeler.com/
"I think with development practices, such as CI, we're going to get to a point that rather than having this one, monolithic milestone where you're given these hundreds of defects, instead the developer will have the ability to ingest these quality defects as they truly are on a daily or nightly basis as their code is checked in, compiled, assessed and run against the test harness allowing for a lot more of these defects to be addressed a lot earlier in the development cycle." -- Omkhar Arasaratnam In today's show, I talk with Omkhar Arasaratnam, Chief Security Architect at the TD Bank Group. I talk with Ohmkar about his work with open source and how component based software has become ubiquitous within the development environment, finding its way into virtually every corner of today's software. With his history as an open source developer, Omkhar brings a unique perspective to his role as security architect. We begin today with a story about his realization as to how prevalent open source really is. About Omkar Arasaratnam Omkhar Arasaratnam is the Chief Security Architect for TD Bank Group. He has over 15 years of Information Technology experience. Omkhar has had a long history of leading global, multi billion dollar projects. He has lead organizations to realize their business goals while effectively managing risk and compliance requirements. Omkhar leads the Enterprise Security Architecture department at TD Bank Group. In this capacity, he has been accountable for revolutionizing the effectiveness of security architecture across the bank. Omkhar is also an accomplished author with several pending patents and is an Open Group certified Master Infrastructure Architect.
At Source Conference in Boston last month, I sat down several times with Tripwire CTO Dwayne Melancon. Our discussion centered around his work with the development and engineering teams at Tripwire, their use of open source components, the future roadmap for Tripwire and Dwayne's vision for placing business context around incident response. We start the discussion with an overview of Tripwire. Highlights 00:43 Overview of Tripwire 04:27 Tool chain at Tripwire 06:14 Use of Open Source Components 09:10 Roadmap for Tripwire 11:03 Business Context Around Incident Response About Dwayne Melancon I was a contributor to both the Visible Ops Handbook and Visible Ops Security Handbook, working with authors Gene Kim, Kevin Behr, and George Spafford. As part of this effort, I have worked as a researcher with Carnegie Mellon’s SEI, the University of Florida, and the IT Process Institute in their studies and benchmarking of IT best practices. I work with numerous corporations around the world on IT service management improvement and IT security, and have teamed with the Institute of Internal Auditors in its pursuit of Generally Accepted IT Principles. As a frequent, highly-rated speaker at national and regional itSMF, ISACA, ISSA, IIA and other industry events, I present on how to achieve world-class IT results. Using a framework of essential IT controls, I provide operations, security, and audit audiences with prescriptive steps they can take to improve IT change policies, procedures and systems.
'"It's only metadata" is a mischaracterization that plays into goverment hands.' -- Bruce Schneier At the 2014 Source Conference in Boston, I was able to sit down with Bruce Schneier after his keynote to clarify his position on several topics he brought up. The twitter stream was on fire during his presentation as he described how the power of government and large corporations affects the internet. Where are the boundaries between personal data and corporate/government usage of that data? What is our responsibility in the equation? An interesting observation from Bruce is that despite the government's insistence that they are only collecting metadata, which according to them has no intrinsic value, that presupposes metadata is somehow less important or less personal when it comes to interrogating the data. This despite that it can be used to generate a network of contacts such as "who your friends are, who your family is, what you're concerned about, where you go, your relationships, your interests", creating extremely an intimate and personal portrait of a person's life. About Bruce Schneier I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I write books, articles, and academic papers. Currently, I'm the Chief Technology Officer of Co3 Systems, a fellow at Harvard's Berkman Center, and a board member of EFF.
"Increasingly, we're putting our lives on the line in software driven devices.From an industry perspective, we've got to start thinking about how we update these devices over time." -- Wayne Jackson I have been working with Sonatype as a community advocate for a while, but never had a chance to catch up with Wayne Jackson until now. My main objective was to ask him the things I want to know about the company, what the security market looks like to him as the CEO and how he intends to guide the company in the future. We start the conversation with defining what, exactly, does the CEO of a software security company do. "Ultimately the only way we are going to solve security issues in the cyber realm is to make better software." -- Wayne Jackson Highlights of our discussion 00:48 What does the CEO of a software security company do 01:07 Why the career transition to software security 02:08 Personal realization of magnitude of software vulnerabilities 02:53 Market differentiation with component security vs code security 04:13 Managing the Central Repository 06:05 Software is everywhere, it's taking over everything 07:11 Choices in managing software security 07:50 Security is an industry problem, not just a software problem 08:30 Create a better ecosystem for security software with community best practices 09:25 Move beyond known vulnerabilities in single components
"There are ways through automation, design and testing techniques where we can take what is traditionally a three to six to nine week testing cycle and shrink it into minutes or hours." -- Curtis Yanko In November of 2013, I was able to catch up with Curtis Yanko, Architectural manager for CIGNA in Hartford, CT. Our discussion is on the cost curve of fixing defects in the application life cycle and alternatives to current methodologies. "Most companies waste somewhere between 30% and 40% of their productivity on rework." -- Curtis Yanko Highlights of the Discussion 00:25 - Analyzing the cost curve of fixing defects 01:45 - The difficulty of proving the cost of fixing a defect 03:15 - The lack of alternatives to current methodologies 04:45 - Some alternatives to current methodologies 06:05 - Managing the security handoff process 07:07 - Real world story on integrating security and developers 13:05 - A wake up call to corporate America 15:40 - Documenting a process based upon real world experience "It's a fast pace world. Disruption can come from anywhere, and even if it's not disruption, it could be just be very profound change. Your ability to respond and act to that is key to stay in the game over the long haul." -- Curtis Yanko About Curtis Yanko, Architecture Manager - Clinical IT / DevOps, Cigna experience in improving process and developer productivity that deliver superior and trusted applications to drive competitive differentiation. Curtis has built his career by helping large enterprises modernize their application development and delivery by architecting and implementing DevSecOps processes that ensure trust and collaboration between development, QA, IT Ops, Legal and Security teams. He is a leading advocate for IT transformation through teaching these different enterprise silos how to partner for success.
"If you take the big, monolithic testing effort you currently have at the end, and you push it towards the beginning but it remains monolithic, you're not going to get the dramatic increase in efficiency and decrease in cost you expect. It has to be an incremental effect." -- John Steven One of the things I have recently been investigating is the true cost, the real cost, of security and how that changes based upon where in the application life cycle you are. I was talking with John Steven from Cigital and we agreed it might be good to record our thoughts to see where it leads. "With security, it's not a question of how far left you can get. It's really a question of are you doing the right things at each step." -- John Steven Highlights of our Discussion 00:45 - Source of current graphs on cost of application security 03:45 - How can you prove cost savings when including security earlier in the application life cycle 06:30 - Process vs technology 07:45 - How early in development should security be inserted 09:25 - Incremental security within the development process 12:17 - How do you measure the effect and efficiency of moving left About John Steven John Steven, Internal CTO John’s expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction to many multi-national corporations, and his keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security & Privacy magazine, and led the Northern Virginia OWASP Chapter. John contributed to the Hacking Exposed Mobile book, and speaks with regularly at conferences and trade shows.
In this morning's news I saw a reference to a project on OWASP that documents the vulnerabilities in web applications and someone who is keeping a public repository of those vulnerabilities. I called and spoke with Simon Bennetts, co-lead of the project with Raul Siles, to hear his thoughts on where this leads and what his vision is for the future of web application security. Highlights of our Discussion 00:34 - How did the project start 02:50 - Directory vs repository 03:30 - How large is the data set 04:15 - How do you anticipate people will use the information 04:45 - Future vision for the project 05:40 - Final thoughts on bug bounties About Simon Bennetts Simon Bennetts (a.k.a. Psiinon) has been developing web applications since 1997, and strongly believes that you cannot build secure web applications without knowing how to attack them. He works for Mozilla as part of their Security Team. Bennetts started the OWASP Zed Attack Proxy project, and leads the international group of volunteers who develop it. He is also one of the founders of the OWASP Manchester chapter and the OWASP Data Exchange Format project.
"I think we have a long way to go to get the broad understanding of what security really means in the development world." -- Steve Lipner Steve Lipner has lead the Security Development Lifecycle team at Microsoft since 2004. The SDL initiative is a set of requirements for secure software development. "The SDL is a set of requirements that developers have to meet. No matter how you are doing development, you have to meet those requirements. A lot of the SDL requirements are based on the application of automated tooling; build requirements, code analysis requirements, automated test tools... " -- Steve Lipner I had an extended discussion with Steve about what the SDL is really for and how it is used at Microsoft. Along the way, we talked about how application security for the cloud is handled with the SDL, and how the disciplines of DevOps/Agile are taken into account. "We've tried with the SDL to provide a discipline and a set of requirements for secure development, but at the same time, to do that in a way that enabled development groups to meet their customer requirements, to meet their market requirements, to meet their time limit requirements." -- Steve Lipner Highlights of our discussion 00:00 Introduction 00:33 History of Security Development Lifecycle at Microsoft 01:55 The purpose of the SDL Microsoft development groups 03:02 Native code vs components 03:53 How does DevOps and Agile fit into the Microsoft security roadmap 06:52 Where does SDL sit in the process of automated deployment 08:26 How are requirements enforced 10:20 The cloud and the SDL 11:25 Application security vs network security 12:01 Future vision of security 12:47 Tools for security 13:44 A future in security About Steve Lipner As the senior director of security engineering strategy in Microsoft Corp.’s Trustworthy Computing Group, Steve Lipner is responsible for Microsoft’s Security Development Lifecycle team, including the development of programs that provide improved product security and privacy to Microsoft® customers. Additionally, Lipner is responsible for Microsoft’s engineering strategies related to the company’s End to End Trust initiative, aimed at extending Trustworthy Computing to the Internet. Lipner has more than 35 years experience as a researcher, development manager and general manager in information technology security, and is named as inventor on thirteen U.S. patents in the field of computer and network security. He holds both an S.B. and S.M. degree from the Massachusetts Institute of Technology, and attended the Harvard Business School’s Program for Management Development.
"Enterprise security has actually become dependant upon how we can identify people at the mobile layer" -- Jack Mannino When it comes to mobile security, you'd be hard pressed to find a more knowledgeable source than Jack Mannino, co-leader of the OWASP Mobile Security Project. During the Software Quality and Assurance Forum sponsored by the Department of Homeland Security last month, Jack and I sat down to talk about his work with OWASP and the mobile initiative. "The ecosystem is arguably just as much of a risk as the actual application security itself. They go hand in hand." -- Jack Mannino Our discussion included ideas on how to move security closer to the beginning of the development project, and why many companies are choosing not to do that. "You'll see pushback from a product or project manager if security impacts their ability go live. They are willing to accept the risks in order to just go live." -- Jack Mannino Highlights of our Discussion 00:05 OWASP Top 10 for Mobile 01:31 GitHub for mobile and open source projects 02:10 Concerns with mobile and security 03:30 Changing security within the development life cycle 04:40 Security automation within the development life cycle 06:45 Pushback to DevOps methodology 07:42 The biggest security threat in mobile About Jack Mannino Jack Mannino is a managing partner at nVisium Security, a leading provider of mobile application and web application security services. At nVisium he is responsible for ensuring that all services are delivered at the highest levels of quality and with keen attention to detail. He focuses on mobile application security research (especially Android), and is the co-leader of the OWASP Mobile Security Project. In addition to the Mobile Security Project, Jack is also heavily involved with the OWASP Northern Virginia Chapter where he serves as the chapter leader. In addition, he is the lead developer for the OWASP GoatDroid Project, and is a contributor to the OWASP RailsGoat Project.
"Some of the common weaknesses are not at the code level. Over 2/3 are at the code level, but the others are at the architecture and design level." -- Joe Jarzombek Joe Jarzombek is Directory for Software and Supply Chain Assurance within the Department of Homeland Security's office of Cybersecurity and Communications. Joe and I sat down for a chat during a recent conference in McLean, Virginia. His premise is that hardware assurance is just as important as software assurance. It was a new concept for me, and an interesting perspective. "It's absolutely worth the overhead [of security automation tools] because of the 100s of thousands of lines of code being produced. You can't do is scalably, in a secure fashion, use you've got tools." -- Joe Jarzombek Highlights from our Talk 00:30 Security automation programs 02:25 Tools for automation 04:30 Hardware counterfeits 07:52 Composability and common weakness patterns 09:12 The viability of "moving left" and empowering developers 10:42 Code analysis within government software ,b>About Joe Jarzombek Joe Jarzombek is the Director for Software Assurance within the National Cyber Security Division of the Department of Homeland Security. In this role he leads government interagency efforts with industry, academia, and standards organizations in addressing security needs in work force education and training, more comprehensive diagnostic capabilities, and security-enhanced development and acquisition practices. Joe served in the U.S. Air Force as a Lieutenant Colonel in program management. After retiring from the Air Force, he worked in the cyber security industry as vice president for product and process engineering. Joe also served in two software-related positions within the Office of the Secretary of Defense prior to accepting his current DHS position. He is a Project Management Professional (PMP) and a Certified Secure Software Lifecycle Professional (CSSLP) As an active member of Toastmasters International, Joe Jarzombek has served as International Director, and he is currently serving as Region Advisor Marketing.
"You can have great policy, you can have great DOD directives and DOD instructions, but if it's not in enforceable contract language, no one is going to pay attention to it." -- John Keane Before my presentation at the Department of Homeland Security "Software and Supply Chain Assurance September Forum" in Washington, DC last week, I was able to catch up with John Keane, the security industry's Software Angel of Death. John and I discuss the idea of contracts, and enforceable contract language, that hold people accountable for what they develop. From there, we get into how developers can become more security conscious just by the tools that they use. The third voice you hear is that of Jeff Deal, VP Government Sales at Sonatype. Jeff had some interesting questions on how to make development teams accountable after scanning has found vulnerabilites. "After a short period of time, the developers learn not to just find and correct mistakes, they don't make them in the first place because the tools are teaching them how to write better code." -- John Keane Highlights of our Conversations 00:05 Security scanning during development 02:47 Enforceable contract language 04:54 DevOps and Agile (or really fast Waterfall) 06:22 Accountability after scanning through a software assurance manager 07:03 Automation of security in the IDE 09:33 Recognizable design patterns in software 12:54 The discipline of code development and managing legacy code (There is a little background noise in the recording because we were standing in the lobby at the conference, having a conversation, and I turned my recorder on.) About John Keane IT Specialist, Test and Independent Verification and Validation (T&IVV) office, newly-formed DoD/VA Interagency Program Office (IPO) which falls under the DoD TRICARE Management Agency (TMA). John was just transferred from the equivalent position in the TMA Joint Medical Information Systems Office. The IPO was established in April 2008, as mandated by Section 1635 of the National Defense Authorization Act (NDAA) for Fiscal Year 2008 (FY08). The IPO acts as the single point of accountability for the development and implementation of electronic healthrecord (EHR) systems and capabilities and provides oversight and management of the delivery of interoperability goals and objectives. John has a number of responsibilities of which one is the Software Code Quality Checking (SCQC) task manager. The SCQC project was nominated for the 2011 North America Government Sector Information Security Project of the Year. John was a Federal Computer Week Top 100 award winner in 1993 for his work in developing the DOD Technical Reference Model. John is a retired Army Officer with 20 years service and this is his second time in the government as a civil servant. During his first time as a civil servant, he was responsible for developing the DoD Technical architecture Framework for Information management (TAFIM) which was adopted by the Open Group as the TOGAF.
In Part 02 of our talk with Jim Routh, Jim talks about the history of components, the original idea behind a component repository and where we are today. His observation that GitHub has become the defacto location for mobile developers is an interesting one, but it still begs the question: Who is going to vet the components? Highlights of the Discussion 00:05 Components and reusability through universal repositories 07:20 Who will vet the components in a universal repository 08:37 Repository of choice for mobile developers 11:12 The mobile phone as a primary computing device About Jim Routh Jim Routh is the Chief Information Security Officer and leads the Global Information Security function for Aetna. He is the Chairman of the FS-ISAC Products & Services Committee and former board member. He is currently a board member of the National Health-ISAC. He was formerly the Global Head of Application & Mobile Security for JP Morgan Chase. Prior to that he was the CISO for KPMG, DTCC and American Express and has over 20 years of experience in information technology and information security as a practitioner, management consultant and leader of technology, analytic and information security functions for global financial service firms. Jim is the winner of the 2009 BITS Leadership Award for outstanding leadership of the Supply Chain Working Group sponsored by the financial industry in collaboration with NIST and the Department of Treasury. He was the 2007 Information Security Executive of the Year for the Northeast and is a widely recognized expert in security program implementation. Jim was successful in reducing information security costs while significantly improving enterprise risk management practices through innovation and transformational leadership.
Jim Routh has one of the best analogies I've ever heard on how to envision a tool for automated vulnerability discovery during the software development process. In Part 01 of our talk, we have an extended discussion on the line between design and remediation, the ideas behind Gene Kim's the Phoenix Project through his work with cross-functional sharing with kanban systems. Part 02 in an upcoming segment explains how components started as a simple idea and are now a central part of the open source development process. Hightlights of the Discussion 00:05 Introducing software security concepts into the development life cycle 02:51 The line between design and remediation 08:18 A automated development tool with contextual help 10:54 Pushback to new security methodologies 13:30 The concept of security "moving left" in the application life cycle 17:02 The Phoenix Project, Kanban boards and cross-funtional sharing of information About Jim Routh Jim Routh is the Chief Information Security Officer and leads the Global Information Security function for Aetna. He is the Chairman of the FS-ISAC Products & Services Committee and former board member. He is currently a board member of the National Health-ISAC. He was formerly the Global Head of Application & Mobile Security for JP Morgan Chase. Prior to that he was the CISO for KPMG, DTCC and American Express and has over 20 years of experience in information technology and information security as a practitioner, management consultant and leader of technology, analytic and information security functions for global financial service firms. Jim is the winner of the 2009 BITS Leadership Award for outstanding leadership of the Supply Chain Working Group sponsored by the financial industry in collaboration with NIST and the Department of Treasury. He was the 2007 Information Security Executive of the Year for the Northeast and is a widely recognized expert in security program implementation. Jim was successful in reducing information security costs while significantly improving enterprise risk management practices through innovation and transformational leadership.
"Security defects come in two flavors; bugs in the implementation and flaws in the design. We're paying quite a bit of attention to bugs and not enough attention fo flaws." -- Gary McGraw Gary McGraw thinks in broad strokes. In our "50 in 50" discussion, he goes beyond our talk of component based vulnerabilities and leads the discussion to the problems inherent with the building of complex applications. From there, we talk about his latest initiatives; architectural risk analysis and how to measure your software initiatives. "What happens when you compose things that were secure, but then you compose them in a way that the designers did not anticipate. It leads to a crazy kind of security flaw." -- Gary McGraw Highlights from our discussion 00:20 How do you integrate software security into DevOps 01:30 The concept of "moving left" in the application development cycle 02:55 Defining software security practices that are usefeul no matter what the software dev life cycle 05:37 Security at the component level 07:15 Three levels of insecurity; creation of components, components in production, combining of components in an insecure way 08:31 Software security for specific verticals 11:36 Consumer assumption of software security 13:03 Architectural risk analysis and threat modeling 13:52 Measuring your software initiative Resources Cigital BSIMM About Gary McGraw I am a technologist, a scientist, a musician, a writer, and a father. I work at Cigital near the blue ridge mountains in Dulles, VA. I live on the Shennandoah river about a mile from the Appalachain Trail in a house built in 1760. Berryville, VA is the closest town, but we're much closer to the Holy Cross Abbey. I am married to Amy Barley. Together, we raise our two boys Jack and Eli.
The "Internet of Things" is of extreme concern now that virtually every device on earth is getting wired. What are the implications? In this wide ranging discussion, I talk with Joshua Corman about his project, the "Rugged Manifesto", and upping the ante on application security. Highlights of our discussion 00:05 The history of the "Rugged Manifesto" 07:07 Who is part of the Rugged Movement 09:26 The patterns within DevOps 12:37 OWASP Top 10 - Go deep vs Go Long 16:40 A different approach to the OWASP Top 10 17:57 The most important factors in your ultimate application security yield 20:08 The problem with the "Internet of Things" 21:35 The agenda at Derby Con in Kentucky, September 2013 Blog: Cognitive Dissidence Rugged Software Manifesto About Joshua Corman Hired to build and run a new team for Akamai called Security Intelligence - reporting to the CSO. Team will do research, analysis, thought leadership, work closely with high risk organizations and drive actionable intelligence into the public sector, government, and critical infrastructure. With almost a third of internet flowing through us, we intend to drive asymmetric gains to security - at a time when it is most needed.
John Willis has some interesting perspectives on the origin of the DevOps movement. Most people think of DevOps as something created conceptually by Patrick Debois in 2009, but from John's point of view, it can be traced all the way back to W. Edward Deming 's '14 Points for Management'. In this talk, we discuss how the community started and its short history. John runs through a list of veritable "Who's Who?" in the DevOps movement. Along the way, we talk about how the community is determining its own course. Resources Mentioned by John The DevOps Cafe: http://devopscafe.org/ IT Revolution Press: http://itrevolution.com/devops-blog/ The Phoenix Project: http://www.amazon.com/The-Phoenix-Project-Helping-Business/dp/0988262592/ The Goal: http://www.amazon.com/The-Goal-Process-Ongoing-Improvement/dp/0884271951/ W. Edward Deming: http://en.wikipedia.org/wiki/W._Edwards_Deming From Deming to DevOps: http://itrevolution.com/deming-to-devops-part-1/ DevOps Days: http://devopsdays.org/ Interview Highlights 00:05 DevOps Cafe Podcast History 02:07 From Open Source to Configuration Management to Cloud to DevOps 05:37 The Convergence of DevOps 06:41 The Visibility of the DevOps Movement and DevOps Days 12:03 Community Contributions to DevOps Days 13:01 The Maturing of the DevOps Movement 16:41 The CAMS Taxonomy: Culture, Automation, Measurement, Sharing 17:47 The Counter Intuitive Nature of DevOps 22:58 From Demmings to Devops 26:56 A Timeline for DevOps 29:09 The DevOps Cookbook and IT Revolution Press 31:49 The Goal of the DevOps Message About John Willis John Willis has worked in the IT management industry for more than 30 years. Currently he is VP of Customer Service and Enablement at enStratus. Prior to enStratus Willis was the VP of Solutions for DTO Solutions where he led the transition to a new suite of automated infrastructure and DevOps solutions. Prior to DTO Solutions. Willis was the VP of Training & Services at Opscode where he formalized the training, evangelism, and professional services functions at the firm. Willis also founded Gulf Breeze Software, an award winning IBM business partner, which specializes in deploying Tivoli technology for the enterprise. Willis has authored six IBM Redbooks for IBM on enterprise systems management and was the founder and chief architect at Chain Bridge Systems.
Gene Kim is at the forefront of the DevOps movement. Through his book, The Phoenix Project, he is educating organizations on what it takes to create a high performing software development environment. In this segment, I talk to Gene about the concept of DevOps and how the DevOp process can be incorporated into the enterprise development environment. Highlights from our Discussion: 00:05 Application security and the position of the DevOps process 01:13 Is the DevOps concept really being used by major organizations 03:40 Public Labs "State of DevOps" study 05:41 "The Phoenix Project" a novel for IT 07:37 Prescriptive, actionable items in the book 08:18 Building the relationship between development and operations 11:58 Bottlenecks in the process of development 14:35 The technical debt of poor development practices 17:00 A parting message from Gene Links Referenced in our Discussion: http://itrevolution.com/the-phoenix-project-excerpt/ https://puppetlabs.com/2013-state-of-devops-infographic/.. http://itrevolution.com/the-phoenix-project-excerpt/
"A software project is not done until your last enduser is dead." -- Kris Buytaert Kris Buytaert was one of the first proponents for the DevOps movement in Europe. Our discussion ranges from the beginning of the DevOps movement through how DevOps is acting as the liaison between developers and IT. Highlights of our Discussion 00:05 The beginning of the DevOps movement 01:45 The growth of DevOps 03:13 DevOps Days, conferences for DevOps 04:05 DevOps and security 05:52 CAMS keyword: Culture, Automation, Measurement and Sharing 08:39 DevOps reaction to testing within the development environment 10:11 DevOps process patterns 12:31 The 10th Floor Test 13:41 Into the future with DevOps DevOps Days: http://www.devopsdays.org/ Kris' Blog: http://www.krisbuytaert.be/blog/ About Kris Kris Buytaert is a long time Linux and Open Source Consultant. He's one of instigators of the devops movement, currently working for Inuits He is frequently speaking at, or organizing different international conferences and has written about the same subjects in different Books, Papers and Articles He spends most of his time working on bridging the gap between developers and operations with a strong focus on High Availability, Scalability , Virtualisation and Large Infrastructure Management projects hence trying to build infrastructures that can survive the 10th floor test, better known today as the cloud while actively promoting the devops idea ! His blog titled "Everything is a Freaking DNS Problem" can be found at http://www.krisbuytaert.be/blog/
loading
Comments