Webinar banner
Doing DevSecOps Right: Implementation and the Metrics that Matter
DevOps brings operations and development teams together through the whole production lifecycle, leading to faster and more agile software development. But harder, better, faster, and stronger doesn’t always mean safer. Security is a critical part of that process and without properly integrating it into every phase, you’re putting your company, and your customers, at risk. But is doing so in a way that doesn't derail agility easier said than done? And once it's done, how do you know you did it right?

Join guest speaker Amy DeMartine, principal analyst at Forrester, and Kelly Shortridge, vice president of product strategy at Capsule8, in a live webcast discussing not only how to implement DevSecOps, but also the KPIs and metrics you should measure to make ensure your company is continuously reducing risk.

May 28, 2019 11:30 AM in Eastern Time (US and Canada)

Capsule8 Logo
* Required information
Loading

Speakers

Kelly Shortridge
VP Product Strategy @Capsule8
Kelly Shortridge is currently VP of Product Strategy at Capsule8. In her spare time, she researches applications of behavioral economics to information security, on which she’s spoken at conferences internationally, including Black Hat, AusCERT, Hacktivity, Troopers, and ZeroNights. Most recently, Kelly was the Product Manager for Analytics at SecurityScorecard. Previously, Kelly was the Product Manager for cross-platform detection capabilities at BAE Systems Applied Intelligence as well as co-founder and COO of IperLane, which was acquired. Prior to IperLane, Kelly was an investment banking analyst at Teneo Capital covering the data security and analytics sectors.
Amy Demartine
Principal Analyst @Forrester
Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.