CHCon Training - Building Security into your Development Team(s)
Date and time
Refund policy
Description
Level: Intermediate
Duration: Full Day
Trainer: Kim Carter (BinaryMist)
Cost: $500+GST ($575). Nonprofits, beneficiaries, contractors $200+GST ($230). Students $100+GST ($115)
Contact Kim with proof for discount codes.
Brief
Kim will lead the class through the tools, techniques and thought processes of both red and blue teams along with how to combine these attributes into the purple team focussing on security, productivity, and tasked with continuously delivering sustainable maintainable technical solutions to market.
Kim will explain the roles of 'T' shaped professionals, including placement of security champions to create your purple Development Team(s).
We will work through how to implement the Sensible Security Model (SSM) within each and every Sprint, including:
- Creating actionable countermeasure Product Backlog Items
- Integrating them into the same Product Backlog that your Development Team has been pulling business focussed items from
- Ordering them based on the risk ratings you create for each
Kim will discuss how and where Agile Development Teams often fail, along with how to succeed with security with a familiar anecdote. Then augmenting your Scrum process within each and every Sprint, with a collection of development focussed processes and practises, tools and techniques that have proven their value at drastically reducing defects before production deployment.
Kim will walk us through the SSM threat modelling process with theory and hands on exercises in areas such as Physical, People, VPS, Network, Cloud and Web Applications. Including sub topics such as Docker, Serverless, PowerShell and many others.
More Detail
Training material will be augmented with Extracts from Kims interviews on Software Engineering Radio with security experts such as Diogo Mónica (Docker Security Team Lead) and Haroon Meer (creator of Canary tools and tokens).
Copies of the first two parts of Kims book series "Holistic Info-Sec for Web Developers" (weighing in at aprx 700 pages) which this training is based on, will be provided as: companion course material to accompany the training, ongoing self learning, and as a valuable reference resource long after the training has finished.
Learnings
Coverage of topic chapters
- Physical
- People
- VPS
- Network
- Cloud (published before training)
- Web Applications
About the Trainer
Technologist / Engineer, Information Security Professional, Entrepreneur and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 15 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit and reducing costs. Co-organiser of information security conference OWASP NZ Day, International trainer, speaker published author, and Software Engineering Radio podcast host, focusing on
- Software and network architecture
- Web development and engineering
- Information security
Kim is also a regular blog poster at blog.binarymist.net. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.