DevSecOps Live
Advance your DevSecOps career through our expert-led meetups. Learn, connect, and grow with peers.

N Different Options To Manage Secrets In Your Kubernetes Cluster
Is your Kubernetes cluster leaking secrets? In this MUST-WATCH security webinar, we reveal 7 POWERFUL methods to protect your sensitive...

N Different Options To Manage Secrets In Your Kubernetes Cluster
Is your Kubernetes cluster leaking secrets? In this MUST-WATCH security webinar, we reveal 7 POWERFUL methods to protect your sensitive...

From Reactive to Effective: Building Application Security that Works
In 2023, 71% of enterprises admitted their AppSec programs were reactive, playing catch-up with vulnerability alerts -– while at the...

From Reactive to Effective: Building Application Security that Works
In 2023, 71% of enterprises admitted their AppSec programs were reactive, playing catch-up with vulnerability alerts -– while at the...

Putting A Leash On AI
In this talk we will look at how the famous AI platforms are processing data, and how they are designed...

Putting A Leash On AI
In this talk we will look at how the famous AI platforms are processing data, and how they are designed...

Automating security tests using Selenium and OWASP ZAP
In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn how to automate security tests using Selenium and OWASP ZAP.Srinivas...

Automating security tests using Selenium and OWASP ZAP
In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn how to automate security tests using Selenium and OWASP ZAP.Srinivas...

Addressing the Top 10 Kubernetes Risks
Given the growth and adoption of Kubernetes, a number of projects have been published in the OWASP community to help...

Addressing the Top 10 Kubernetes Risks
Given the growth and adoption of Kubernetes, a number of projects have been published in the OWASP community to help...

Threat Modelling and Beyond with CAIRIS
Secure software needs design assurance, but code is too granular to spot all design problems. Moreover, contemporary threat modelling practices...

Threat Modelling and Beyond with CAIRIS
Secure software needs design assurance, but code is too granular to spot all design problems. Moreover, contemporary threat modelling practices...

Proven Threat Modelling Tactics for DevOps
As attendees probably understand, DevOps isn’t really about automation. But, we’ve all heard claims that “everything in DevOps can be,...

Proven Threat Modelling Tactics for DevOps
As attendees probably understand, DevOps isn’t really about automation. But, we’ve all heard claims that “everything in DevOps can be,...

The 3 Ways of DevOps as the Keys to Developer-Centric Application Security
Developer-Centric Application Security is a cultural transformation that you cannot achieve without building your approach around Gene Kim's 3 Ways...

The 3 Ways of DevOps as the Keys to Developer-Centric Application Security
Developer-Centric Application Security is a cultural transformation that you cannot achieve without building your approach around Gene Kim's 3 Ways...

Software Factories: What are they?
A software factory is an organized collection of software assets, tools and processes that expedite the production and delivery of...

Software Factories: What are they?
A software factory is an organized collection of software assets, tools and processes that expedite the production and delivery of...

How To Learn Policy as Code Without Losing Your Mind
If you wanted to explore Policy as Code, and better yet, get started with Policy as Code, learn with us...

How To Learn Policy as Code Without Losing Your Mind
If you wanted to explore Policy as Code, and better yet, get started with Policy as Code, learn with us...

Scaling Product Security With A Product Security Lead Program
A security champions program is a popular method to scale application security within an organization. However, as security initiatives increase...

Scaling Product Security With A Product Security Lead Program
A security champions program is a popular method to scale application security within an organization. However, as security initiatives increase...

Threat Modeling With Code
We explore the advantages and limitations of "Threat Modeling As Code" and how it has been expressed as Threat Modeling...

Threat Modeling With Code
We explore the advantages and limitations of "Threat Modeling As Code" and how it has been expressed as Threat Modeling...

Threat Modeling Tales & Privacy Parables: Fact or Fiction?
Threat modeling is hot! The OWASP top 10 recognizes it as a valuable approach to ensure secure design. Threat modeling...

Threat Modeling Tales & Privacy Parables: Fact or Fiction?
Threat modeling is hot! The OWASP top 10 recognizes it as a valuable approach to ensure secure design. Threat modeling...

Privacy Threat Model Using LINDDUN
Privacy Threat Model Using LINDDUN - Kim Wuyts 📚 What will you learn? ✅ A short introduction to LINDDUN and...

Privacy Threat Model Using LINDDUN
Privacy Threat Model Using LINDDUN - Kim Wuyts 📚 What will you learn? ✅ A short introduction to LINDDUN and...

Tools and Tactics to Rescue You from API Security Mistakes
Many security solutions, ancient or new, focus on catching security errors when code is written in stone. We need to...

Tools and Tactics to Rescue You from API Security Mistakes
Many security solutions, ancient or new, focus on catching security errors when code is written in stone. We need to...

Bringing Dev and Sec Together with Interactive Code Maps
Introducing Google Maps for code. Security teams are experts at finding design-related security vulnerabilities, particularly those that elude typical security...

Bringing Dev and Sec Together with Interactive Code Maps
Introducing Google Maps for code. Security teams are experts at finding design-related security vulnerabilities, particularly those that elude typical security...

The Essential DevSecOps Controls in Azure That You Can Get Started with Today
This webinar aims at introducing the essential security controls that are available in Azure, and Azure DevOps. The webinar is...

The Essential DevSecOps Controls in Azure That You Can Get Started with Today
This webinar aims at introducing the essential security controls that are available in Azure, and Azure DevOps. The webinar is...

To DevSecOps or not to DevSecOps: is that a question?
The term DevSecOps divides even the security industry itself. The DevOps Security archetype model aims to help stakeholders and organizations,...

To DevSecOps or not to DevSecOps: is that a question?
The term DevSecOps divides even the security industry itself. The DevOps Security archetype model aims to help stakeholders and organizations,...

DevSecOps: Challenges and Opportunities
In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn DevSecOps Challenges and Opportunities. Join Mohan Yelnadu, the global head...

DevSecOps: Challenges and Opportunities
In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn DevSecOps Challenges and Opportunities. Join Mohan Yelnadu, the global head...
About DevSecOps Live
DevSecOps Live meetups are free online meetups aimed at professionals new to DevSecOps and Product Security, or those interested in learning security at scale.
Yearly Meet-ups
Connect with peers and explore new tools and practices to keep you up-to-date.
Hands-On Labs
Interactive sessions where participants practice security tools in browser-based labs.
Expert panels
You will learn from the most experienced security professionals in the field, so don’t miss it!
AMA (Ask Me Anything)
Address your security-related concerns with confidence. Our team always ready to support you.