SOC 2, ISO 27001 & GDPR Compliant
pdso-logo

DevSecOps Live

Advance your DevSecOps career through our expert-led meetups. Learn, connect, and grow with peers.

N Different Options To Manage Secrets In Your Kubernetes Cluster
RECENT EVENT

N Different Options To Manage Secrets In Your Kubernetes Cluster

Is your Kubernetes cluster leaking secrets? In this MUST-WATCH security webinar, we reveal 7 POWERFUL methods to protect your sensitive...

24 April, 2025

60 min

N Different Options To Manage Secrets In Your Kubernetes Cluster
RECENT EVENT

N Different Options To Manage Secrets In Your Kubernetes Cluster

Is your Kubernetes cluster leaking secrets? In this MUST-WATCH security webinar, we reveal 7 POWERFUL methods to protect your sensitive...

24 April, 2025

60 min

From Reactive to Effective: Building Application Security that Works

From Reactive to Effective: Building Application Security that Works

In 2023, 71% of enterprises admitted their AppSec programs were reactive, playing catch-up with vulnerability alerts -– while at the...

15 August, 2024

60 min

From Reactive to Effective: Building Application Security that Works

From Reactive to Effective: Building Application Security that Works

In 2023, 71% of enterprises admitted their AppSec programs were reactive, playing catch-up with vulnerability alerts -– while at the...

15 August, 2024

60 min

Putting A Leash On AI

Putting A Leash On AI

In this talk we will look at how the famous AI platforms are processing data, and how they are designed...

26 October, 2023

60 min

Putting A Leash On AI

Putting A Leash On AI

In this talk we will look at how the famous AI platforms are processing data, and how they are designed...

26 October, 2023

60 min

Automating security tests using Selenium and OWASP ZAP

Automating security tests using Selenium and OWASP ZAP

In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn how to automate security tests using Selenium and OWASP ZAP.Srinivas...

28 February, 2023

120 min

Automating security tests using Selenium and OWASP ZAP

Automating security tests using Selenium and OWASP ZAP

In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn how to automate security tests using Selenium and OWASP ZAP.Srinivas...

28 February, 2023

120 min

Addressing the Top 10 Kubernetes Risks

Addressing the Top 10 Kubernetes Risks

Given the growth and adoption of Kubernetes, a number of projects have been published in the OWASP community to help...

23 February, 2023

60 min

Addressing the Top 10 Kubernetes Risks

Addressing the Top 10 Kubernetes Risks

Given the growth and adoption of Kubernetes, a number of projects have been published in the OWASP community to help...

23 February, 2023

60 min

Threat Modelling and Beyond with CAIRIS

Threat Modelling and Beyond with CAIRIS

Secure software needs design assurance, but code is too granular to spot all design problems. Moreover, contemporary threat modelling practices...

24 November, 2022

60 min

Threat Modelling and Beyond with CAIRIS

Threat Modelling and Beyond with CAIRIS

Secure software needs design assurance, but code is too granular to spot all design problems. Moreover, contemporary threat modelling practices...

24 November, 2022

60 min

Proven Threat Modelling Tactics for DevOps

Proven Threat Modelling Tactics for DevOps

As attendees probably understand, DevOps isn’t really about automation. But, we’ve all heard claims that “everything in DevOps can be,...

25 October, 2022

60 min

Proven Threat Modelling Tactics for DevOps

Proven Threat Modelling Tactics for DevOps

As attendees probably understand, DevOps isn’t really about automation. But, we’ve all heard claims that “everything in DevOps can be,...

25 October, 2022

60 min

The 3 Ways of DevOps as the Keys to Developer-Centric Application Security

The 3 Ways of DevOps as the Keys to Developer-Centric Application Security

Developer-Centric Application Security is a cultural transformation that you cannot achieve without building your approach around Gene Kim's 3 Ways...

8 September, 2022

45 Minutes min

The 3 Ways of DevOps as the Keys to Developer-Centric Application Security

The 3 Ways of DevOps as the Keys to Developer-Centric Application Security

Developer-Centric Application Security is a cultural transformation that you cannot achieve without building your approach around Gene Kim's 3 Ways...

8 September, 2022

45 Minutes min

Software Factories: What are they?

Software Factories: What are they?

A software factory is an organized collection of software assets, tools and processes that expedite the production and delivery of...

28 July, 2022

60 min

Software Factories: What are they?

Software Factories: What are they?

A software factory is an organized collection of software assets, tools and processes that expedite the production and delivery of...

28 July, 2022

60 min

How To Learn Policy as Code Without Losing Your Mind

How To Learn Policy as Code Without Losing Your Mind

If you wanted to explore Policy as Code, and better yet, get started with Policy as Code, learn with us...

28 June, 2022

60 min

How To Learn Policy as Code Without Losing Your Mind

How To Learn Policy as Code Without Losing Your Mind

If you wanted to explore Policy as Code, and better yet, get started with Policy as Code, learn with us...

28 June, 2022

60 min

Scaling Product Security With A Product Security Lead Program

Scaling Product Security With A Product Security Lead Program

A security champions program is a popular method to scale application security within an organization. However, as security initiatives increase...

16 June, 2022

60 min

Scaling Product Security With A Product Security Lead Program

Scaling Product Security With A Product Security Lead Program

A security champions program is a popular method to scale application security within an organization. However, as security initiatives increase...

16 June, 2022

60 min

Threat Modeling With Code

Threat Modeling With Code

We explore the advantages and limitations of "Threat Modeling As Code" and how it has been expressed as Threat Modeling...

26 May, 2022

60 min

Threat Modeling With Code

Threat Modeling With Code

We explore the advantages and limitations of "Threat Modeling As Code" and how it has been expressed as Threat Modeling...

26 May, 2022

60 min

Threat Modeling Tales & Privacy Parables: Fact or Fiction?

Threat Modeling Tales & Privacy Parables: Fact or Fiction?

Threat modeling is hot! The OWASP top 10 recognizes it as a valuable approach to ensure secure design. Threat modeling...

28 April, 2022

60 min

Threat Modeling Tales & Privacy Parables: Fact or Fiction?

Threat Modeling Tales & Privacy Parables: Fact or Fiction?

Threat modeling is hot! The OWASP top 10 recognizes it as a valuable approach to ensure secure design. Threat modeling...

28 April, 2022

60 min

Privacy Threat Model Using LINDDUN

Privacy Threat Model Using LINDDUN

Privacy Threat Model Using LINDDUN - Kim Wuyts 📚 What will you learn? ✅ A short introduction to LINDDUN and...

28 April, 2022

60 min

Privacy Threat Model Using LINDDUN

Privacy Threat Model Using LINDDUN

Privacy Threat Model Using LINDDUN - Kim Wuyts 📚 What will you learn? ✅ A short introduction to LINDDUN and...

28 April, 2022

60 min

Tools and Tactics to Rescue You from API Security Mistakes

Tools and Tactics to Rescue You from API Security Mistakes

Many security solutions, ancient or new, focus on catching security errors when code is written in stone. We need to...

30 September, 2021

60 min

Tools and Tactics to Rescue You from API Security Mistakes

Tools and Tactics to Rescue You from API Security Mistakes

Many security solutions, ancient or new, focus on catching security errors when code is written in stone. We need to...

30 September, 2021

60 min

Bringing Dev and Sec Together with Interactive Code Maps

Bringing Dev and Sec Together with Interactive Code Maps

Introducing Google Maps for code. Security teams are experts at finding design-related security vulnerabilities, particularly those that elude typical security...

26 August, 2021

60 min

Bringing Dev and Sec Together with Interactive Code Maps

Bringing Dev and Sec Together with Interactive Code Maps

Introducing Google Maps for code. Security teams are experts at finding design-related security vulnerabilities, particularly those that elude typical security...

26 August, 2021

60 min

The Essential DevSecOps Controls in Azure That You Can Get Started with Today

The Essential DevSecOps Controls in Azure That You Can Get Started with Today

This webinar aims at introducing the essential security controls that are available in Azure, and Azure DevOps. The webinar is...

29 July, 2021

60 min

The Essential DevSecOps Controls in Azure That You Can Get Started with Today

The Essential DevSecOps Controls in Azure That You Can Get Started with Today

This webinar aims at introducing the essential security controls that are available in Azure, and Azure DevOps. The webinar is...

29 July, 2021

60 min

To DevSecOps or not to DevSecOps: is that a question?

To DevSecOps or not to DevSecOps: is that a question?

The term DevSecOps divides even the security industry itself. The DevOps Security archetype model aims to help stakeholders and organizations,...

21 May, 2020

60 min

To DevSecOps or not to DevSecOps: is that a question?

To DevSecOps or not to DevSecOps: is that a question?

The term DevSecOps divides even the security industry itself. The DevOps Security archetype model aims to help stakeholders and organizations,...

21 May, 2020

60 min

DevSecOps: Challenges and Opportunities

DevSecOps: Challenges and Opportunities

In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn DevSecOps Challenges and Opportunities. Join Mohan Yelnadu, the global head...

16 March, 2020

60 min

DevSecOps: Challenges and Opportunities

DevSecOps: Challenges and Opportunities

In this Practical DevSecOps's DevSecOps Live online meetup, you’ll learn DevSecOps Challenges and Opportunities. Join Mohan Yelnadu, the global head...

16 March, 2020

60 min

About DevSecOps Live

DevSecOps Live meetups are free online meetups aimed at professionals new to DevSecOps and Product Security, or those interested in learning security at scale.

Yearly Meet-ups

Connect with peers and explore new tools and practices to keep you up-to-date.

Hands-On Labs

Interactive sessions where participants practice security tools in browser-based labs.

Expert panels

You will learn from the most experienced security professionals in the field, so don’t miss it!

AMA (Ask Me Anything)

Address your security-related concerns with confidence. Our team always ready to support you.