Events Add an event Speakers Talks Collections
 
FOSSASIA Summit 2020
March 20, 2020, Midlothian, TX, USA
FOSSASIA Summit 2020
Request Q&A
FOSSASIA Summit 2020
From the conference
FOSSASIA Summit 2020
Request Q&A
Video
How cloud-native applications are helping orgs stay ahead of cybersecurity threats
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Add to favorites
88
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About the talk

Major organisations are facing two seemingly contradicting threats: on the one hand, they are challenged to become more agile and efficient by the rise of new players such as startups and FinTech, while on the other hand, the constant flow of advanced attacks and breaches force them to become more cautious about their software. The competition requires fast execution and innovation, while security threats require more control. The speed of execution and complexity of attacks increases exponentially, however the attacks almost systematically rely on missed security hygiene, highlighting an evident truth: security and other IT operators are stretched thin by manual processes and traditional approaches to security.As DevOps approaches become mainstream, we can look at the evidence of what has enabled the success of the cloud tech giants: cloud-native architectures. Leveraging container orchestration, and end-to-end automation, cloud-native security enables security teams to reduce their manual tasks and focus on what matters most: reduce risk, developing added-value services, and collaborating with users and developers to raise awareness and build secure tools, finding vulnerabilities and suspicious activities and improving the incident response. In this presentation, we will review the improved security outcomes experienced by the largest organisations when transiting to a cloud-native architecture, as well as emerging practices enabling the teams to remain efficient and collaborate better.

About speaker

Jerome Walter
Director, Security Modernisation at VMware

With more than 18 years of experience, Jerome is a forward looking and innovative security executive with strong hands-on experience ranging from defining governance, reengineering processes and implementing technical solution. Driven by a deep passion for continuous improvement and challenging the status quo, Jerome believes in cultivating a balanced culture of business-driven security through operational effectiveness. As Pivotal’s Field Chief Information Security Officer for Asia Pacific, Jerome has been charted to advance cloud-native security and modern user-centric development methodologies across Pivotal’s customers and offices in the region. He is an advocate of adversarial testing and chaos engineering as a practice for continuous improvement in security and resilience.Before joining Pivotal, Jerome served as Director, Security Architecture & Delivery at Prudential Asia and regional Chief Security Officer at Natixis. Before working in security and resilience, Jerome held positions as system engineer and developer. Jerome holds a Master of Science in IT Engineering from EFREI, France, and an MBA in Finance from HKUST Business School.

View the profile
Share

Tell everyone. I hope everyone is doing fine and safe. I'm really sorry Ivan. I'm not able to join today. Already want to appreciate your New Jersey. To be anywhere remotely and recoat. So I just want to share with you. How can I make cheese and containers for it before we turn into Kapa, cat responds to introduce myself. My name is Jerome Walter I am looking at the word generation where we can. You stop the music. Sunday engineering book release the nearest

security for the last 15 years and so today would be landed and showings for Christy are. We can leverage those tools that developers and engineers and every day and we use them. I'm not today since it's what people do you spell companies to you? I want you here because I do believe that there is another football to GT-R. Did where I may not be. And for most when it comes to open store right now and if you ask for companies or open doors, Jim where is known for this year. So it's not really as absolutely

as an ounce of shredded cheese and sour cream and cheese today. So it's free and open source definition of Kyoto Kyoto. We're sort of The Offspring with no. Gemaire Distributing into maintaining fostering making password. That did not say that carry support phone number of other projects of the ammonia has been released yet. We're should be seeking you Dim. Whereas So today would be talking about qualities about 30 results. Actually in the definition of Financial Security, bring a

house security Kristoff. When you ask people what qualities of Eternity replication is you would receive a lot of different answers with our organization has done a great job. I mean, it's so definition of social network computing storage on demand on Demand with a nice breeze. A message to Christine in the last 10 years, in the adoption of cloud technology on being able to go pick provide resources to the way we deploy your application received the application, last web applications about

Supervision and Destroy resources on demand applications of scalable. And this is why the core of Ghana. Chief is about allegations from India, to Mission, Microsoft supporter of how do you liberate? See, if you eat also spell technology. Read to practice essays of Minnesota. Dakota Creek Drive In The Crowd, gives you any resources, anywhere in a matter of minutes and timing, to use allows you to put in application and you wear at any time. But all of it is really suffering from the corner of

East Vista, Square, Define, everything, software-defined application separate separate Network Supply. Define. Unless you really think about everything that you really, Aberdeen able to do Skate 3 cheat codes on demand. And Decor off, Sony TV 3D containers Stripes. You sure, you should look at College vacations, in need to be distributed to need to be cautious and to be deployed, and that's what containers should you broil a lightweight, workloads, pool table with anywhere across the

containers? Usually, people ask and half on scription wrong security of containers is two types of the secret of the container. Are you building a container to be secure that for you? She'll actually we get a lot of football Chi-Chi's to receive the way we do security, thanks to Michael services in containers and that's pretty what I want for you to do what you want. Craigslist in Tennessee Trader. You try to turn on Hulu on Carmen's, you know, we provision

operating systems and then we build anything manually on top of the $14 membership application different settings of the franco-prussian. Really overhead. We're giving wish today. Container the service with that phone as a service. You really think I want to make sure you knew how to make you provisioning for your prayers and your net working on your car. Regardless of the application running on a fuel purchase and your net working in the dining room. Remember to give you Wayne's first benefit instead

of dealing with important cities and it is 93% below. The bad. You're lying is consistent. Even though today it's a lot of the security work today. I'm going to meet with two containers so we run time, he's critical in security aspects which were organized in the content of the application as well. Dive into those patterns of this key points in containers. First your protein system? In the past, were deploying big operating system because we wanted them to be able to run any

races of the Oprah to stand as you want. And you really want for Christmas in terms of minimizing the size of your penis. Why? Because from a security perspective, we see more and mole would be cold lay of the land attacks using what's already on the machine, to be able to you never again. Do I reduce the size of your dinners from a difficult person to give you make it faster to deploy from a security perspective, to reduce the tools that would be able to use you. Pull your application. So yeah, I need you to pray for Smith of mysteries. Do you want that to be

harmed in this way for the take me to Soak City or you definitely want you to look at Medusa by golden armor? they need space operations is very important, but you still need to focus on making sure is it Mcgreevy's a quarter of the benefit. We having fun, and she is the principal of immutability. Every single tomato cheese and you are not changing it manually. You reduce your risk of having independent population changes, you remove the fact that people connect from the server changes

are. You should remove security administrators connection to the deceased and the core aspects of Carnegie. Beautiful East. You do changes manually. This is the bottom. Great. Sorry, I don't know how to take any more aspects of it is Nick, working, and containers, and you're going to have a lot of work with and everything. Just open the side where all the Senators and all your notes on open flight network-wide, it's easy and good for. If you can see, I'm getting things down from security perspective, read nuts, the best

approach, because I miss you already, if you think of the proud really what we wish we were able to stop by Define Network attributes bass featuring so really if you do and want to embrace lost in containers, very important since you won't Michael segmentation, do you want to greedy as signals appropriately? But you don't want to deal with a piece because I cleaned up and everything so release, networking remove flat, networks Inc of the software-defined network, find a grave,

the dream, but he's adapted to your business. The next level up. He's really to continue a run time and again, this year, we see a lot of nice things are starting to really be cautious about it. In today. With the reports of unity platformer, the explosive is in Jeopardy. If you were even worse the notifications, that means anyone can do, everything's once everything is okay. 45 months of receipt. He's driven by ati's. You're really want to make sure your API endpoint, which is really on the central point of all your data center.

and it was a big mistake, was privileged to take one of the core benefits of late dinner at 6 to create a space operations, mixture is that, Everything is run to the container is actually no woman preview. Ledge outside doesn't have access to modify your hoes. Are you one of those things that is driving a stick in your container to make sure that your friend and forget the rest of the video game or very, very Best Buy. When we still have something that goes inside the container, NASA released the image and that's where really, which is a difference, is the difference

between a plateau and where do tomatoes come from when you really still build the contents of your email and asked for you, where it's from, people them to you, to protect your pipeline, your Registries, where was the center point and the crown jewel of your passport. If someone has accessories about you, you break into your pipeline and modify sings than you're losing all the benefits of the Moon. Food in your time, trying to do this and if someone can compromise the Registries and everything up like a very potent, red flag

and protect your pipe and protect the registry and because you've been getting your developers would be building if you don't want to and you never will. I wear a benefit from reduced, extra secret has a procedure done. School fees will be a petition service. And do you think that means someone else has a job for you? All looking for going to be cheap if I didn't use the latest teenage. So do use his benefits, but I also need the apps. You never dated just before we regularly. Make sure is a few house

today. Facebook app. That means when your Betta platform, you been a change to platform for building at home. Do you want to learn how to do a bunch of the network? And Michael sigmon? Did you get to make sure they don't stumble up? I need one of the benefits of going through platform. Please, you build it wants to do the hard work. Once upon your compliance and security risks with benefits and so what are the benefit you go through and you go you provision fast and secure environment and one of the cheap principal,

make sure that the authority between development environments that are the same as production. So that you do is challenge, he's all applications that run and work there and didn't work for me. Australian government gives an environment that they know we work at like a cycle that I've stood for speeding Avenue, instead of Iowa Water Rehab, didn't really have any relationship with Dark to see if we look at the security aspects, we would like to look at it from a

kill chain. You can't do anything about the attack, but once you're a nice person, you need to do is reduced by reducing lateral movement and most containers platform today will provide you a service network. Dana container, networking, Instagram, making sure patients are pictures of JC and that you declare a freaking vacation allowed to cut myself. Once you do that, you really get a lot of benefits with us. Three very important things that you benefit that was

just on time. Once your position is distributed, would go berserk, you fax the benefit from making sure you don't have nowhere. And removing their secrets from your code and rotation regularly. Also, actively reduce the sources of data. Breach, I believed stolen Secrets keys in the top three sources of bridge today. So we talked about containers, let's take a step back and think about how car naked application until they achieve practice is at 6. So, anyone who let me at least at least look at those applications about actors

principal in. Return is very important. If you want the Samurais am very quickly. That means literally about to go fishing on application without the dog container base, to be able to be portable and HD. I'm so if you look at those protectors and you try to extract, what's the value for Australia? Usually, look at the Frameworks that I do, the idea, I'm just worried about the musical, no change. Once you push reproduction, don't change gears rebuild distributed every application should have said, no to that. You can order it on potato. Ephemeral.

We used to in the past have those Services, those occasionally want you have begun running for. So long our set of nearly as long because I know, right? And you design application if you wanted to give you want them to be able to Detroit station new message. Most organizations today, most of our application we expect, you have uses Aquino and thought, when does the network with the network security application? If you think about it with Benefits, we have is

he does a lot of progress in the Constitution system security. So we have a pretty good idea to use, it really has making sure that this is the right to make sure that you have the number to tease. You reduce criticality of it by just making sure that you know who is his father. Reset, erase your school, principal because it really changed the way we can stress cause you to have to be a video to distribution allows reporter on Sunday. If I move workloads, allows you to ensure that the codes in production, exactly what's in your repository

and shoot. In confidence at it tomorrow, if something happens, you can rebuild has improved crazy, but you could also improve reduce your risk by posting a request and you really messed around with principal to the key aspects of big, a bridge today in technology immutable and, you know, that no one can destroy to make sure they can you find a time to pick those up. You sure, don't you rotate your credentials, your stolen, credentials, so dumb received his benefits everywhere. So we get the new Cyber hygiene today around the streetcars. On

simple way of remembering by improving the ability to repair to find you and Pastor, I have a distributed system. I have a good reason applications that are distributed. You can read Dave, which means rebuilding regularly. To make sure that's what runs encouragement, is what you want. And not something has been compromised. If you rotate your credentials again refused, as we see the receipt where people own credentials, be a judge uses in your API, senior picture.

She's going to come by and once you come by and see if we really see the benefits of important principle but only because we see them work and so is not design. Possibly for security sign for the love of productivity improvements in the fabric of us to deploy applications past the scale, reduce your house to make sure that once they build a platform that he's compliance every application to push into. It is deployed, the greedy reduce. You already said I'm allowed to security security professional, I could focus on

the matter. Advanced monitoring Casey's Mega Latias and prospector. I just want to meet you on one hand but also to make sure that even if they are come from a compromise, the attack Windows. The time that the attacker had to find another of your auntie and move out to look like a move to. The objective is produced some of our customers, all doing this, repeat we do, sometimes it's moving towards being able to do daily as well, because it is so much benefit. Once everything is towed in, when she practices variables, are the benefits of a

mastiff, eat somewhere. And one even if something happens I'm really at the bottom of Security even if we look at all the advanced threats and persistent attack from nation-states the most of the case missing package by faster for Memphis Improvement, between existing environment where everyone security struggles to get patch. I will you need to negotiate patching windows with a business degree in dominoes. I'm pretty critical because this year received that are exploited by attackers

within days. You got beat you by pretty fast. When it matter is extremely important. Really see he's Improvement in Social Security outcomes to recover and to rebuild regularly. You'll give up a practice that actually reduced as well as the number of bugs. Navigate to reduce on Route 840, Secret in your past or it could be used. So if I want to reach you summarize of it, I have three calls for you. Think about this idea. Principal whenever you drop another application. Really, he's my glass home beautiful. Do I have

a very important principle volume up and repeat radio. Repeat your controls once you have if your co-workers, a lot of things in security changes in Sydney, S phone keeps changing massively the way you do your body and your mind. We're prevention, be very different up with the recent oil controls and making sure that the liver and also very important reports measured by your pastor prediction. Next version gold very fast and it's important. But you can also change facts and information

architecture. We see both women being able to develop faster security being able to react faster Frictionless security is about removing the other head so that everyone can focus on when Matt has an unusual event spaces and working. Working together. Again, I wish I was with you and we could have a have no more interactive discussion together, but reach out to me, please, I'll be happy to do dialysis with you to explore how we can help you. How committed can help you

improve your security and how everything software-defined Konnection produce a degree and changing the way you look at. Do it piece. It was a pleasure sharing with you and I hope that your reach out to me and we can actually interactive discussion that would have normally have and thank you very much.

Cackle comments for the website

Buy this talk

Access to the talk “How cloud-native applications are helping orgs stay ahead of cybersecurity threats ”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Access to all the recordings of the event

Get access to all videos “FOSSASIA Summit 2020”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “Artificial Intelligence and Machine Learning”?

You might be interested in videos from this event

November 6, 2020
Online
35
3.5 K
ai, amazon web services, apple, covid-19, deep learning, developing, devops, ml ops

Similar talks

Isham Mohamed Iqbal
Lead Software Developer at kloudynet Technologies
+ 1 speaker
Fathima Naja
ICT Lecturer at South Eastern University of Sri Lanka
+ 1 speaker
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Ricky Setyawan
Head of Consulting at DataTech Integrator Pte Ltd
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Lakshmipathi Ganapathi
Software Engineer at Collabora
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Buy this video

Video
Access to the talk “How cloud-native applications are helping orgs stay ahead of cybersecurity threats ”
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
892 conferences
35963 speakers
13720 hours of content