JupiterOne, DevOps Connect at RSAC 2021

by

DevOps Connect: DevSecOps, this year co-organized by JupiterOne and MediaOps, has been part of the RSA Conference agenda for 5 years. Each spring, we put together internationally recognized speakers to bring you the best in peer-to-peer knowledge exchange. This year, our focus is on Securing the Cloud Native World.

This is your chance to get in on the fun by submitting for a speaking session. The conference is virtual this year, so we're looking for abstracts from around the world. The CFP is open.

We have found that over half the attendees at this event are security professionals who would like to hear how others are building security into their cloud native projects. Sessions will include ideas on how to better secure your systems, as well tips one cyber asset discovery and management. All sessions are recorded and available to those who register. The recordings will be available for on-demand viewing following the conference.

Here's your personal invitation from Mark Miller, our Senior Director of Content and Community.  The CFP is now open. We look forward to reading your submission.

Mark Miller
Mark Miller

Mark Miller speaks and writes extensively on DevSecOps and Cybersecurity. He has published 9 books, including "Modern Cybersecurity: Tales from the Near-Distant Future"

Keep Reading

Introducing Continuous Controls Monitoring (CCM) | JupiterOne
November 7, 2024
Blog
Introducing Continuous Controls Monitoring (CCM)

CCM delivers real-time visibility, proactive risk management, and streamlined compliance for security.

Now Available: JupiterOne’s Public Postman Workspace | JupiterOne
October 31, 2024
Blog
Now Available: JupiterOne’s Public Postman Workspace

Explore JupiterOne’s Public Postman Workspace to streamline your workflows and enhance your security operations.

Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets | JupiterOne
October 16, 2024
Blog
Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets

Vulnerability scanners flood teams with alerts, but CTEM helps prioritize based on exploitability and business impact, ensuring focus on the most critical threats.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.