Print Page   |   Contact Us   |   Sign In   |   Register

Join Vivit
Contact Vivit
Become a Leader
Become a Sponsor
Community Search

Digital Transformation with HPE Cloud Management

Deliver Amazing Apps Fast in the Idea Economy: a DevOps Transformation

Virginia / Mid-Atlantic VIVIT Chapter Meeting

Chicago Chapter Webinar

Learn how HPE’s Mobile Solutions Revolutionize Synthetic Monitoring

LinkedInTwitterFacebookGoogle Plus

Research Findings on Application Security in DevOps
Tell a Friend About This EventTell a Friend
Research Findings on Application Security in DevOps

Are you ahead or behind? Research Findings on Application Security in DevOps

When: Tuesday, September 20, 2016
8:00 - 9:00 AM PDT (Los Angeles), 11:00 AM - 12:00 PM EDT (New York), 17:00 - 18:00 CEST (Frankfurt)
Where: Webinar
Contact: Cindy Blake

« Go to Upcoming Event List  

To view this webinar, recording, and Q&A, go to: 


DevOps is an immensely popular topic. And there is frequent debate over whether practicing DevOps makes your applications more secure or less secure. So we conducted a blind study to research the state of Secure DevOps. We will share our findings such as:

  • What tools and processes are mature DevOps shops using?
  • How mature is the average DevOps shop?
  • How is application security thought of in DevOps methodology?
  • Common misunderstandings around application security and the resulting risk.

See how we incorporated these findings to help you integrate application security into an Agile or DevOps methodology. You need not compromise.


Cindy Blake CISSP
Product Marketing Manager
Hewlett Packard Enterprise

  • Thought leader integrating security into DevOps, working to bring together strengths of the Application SDLC tools and App Security tools to propel customers in their quest for rapid development and deployment without compromising security
  • Brings a unique perspective that combines a technical background and history as a technology buyer with rich marketing experience
  • Within HPE Enterprise Security Products, she has applied advanced security intelligence to demonstrate use cases that transform traditional security approaches, leveraging unstructured data sources and non-traditional tools (HPE Autonomy IDOL) to provide added risk insight
  • Brought to life the "Bad Guy Lair” and a mock SOC to demonstrate the importance of threat intelligence and a holistic, integrated security program; and she developed a Security Maturity Curve, documented by Quinstreet, as an unbiased metric for enterprises to evaluate their security posture
  • Launched HPE Application Defender, a SaaS-based application self-protection solution, and previously HP Threat Central, a crowd-sourced exchange to help enterprises more proactively identify threats


Sign In

Forgot your password?

Haven't registered yet?

Vivit Blog