-
-
The
#BSIMM provides a framework for unified conversations with all subject matter experts.#DevSecOpshttp://ow.ly/rtZZ30pw5FR -
-
Hotel bathroom for
#BSIMM looks like someone’s really busy Github repo... pic.twitter.com/llk20fwr7I
-
Excited to release 10th
#BSIMM study. Notice new activities observed in firms trying to software-define security governance, effective engineering-led initiatives, as well as changes to the way we observed firms conducting tried-and-true activities. http://ow.ly/w95V101Mese -
First iteration of the hybrid/pbx model, will refine this piece of work in the coming days
#BSIMM@OwaspSAMMpic.twitter.com/oGrFlPsvrf
-
Here is
@SonyaMoisset doing a mapping between@OwaspSAMM and#BSIMM to create our version of these maturity models, that we will implement has a graph (in@jira)@TashJNorris@sebadele@m1splacedsoul@cigitalgempic.twitter.com/OXurwSFZ4E
-
So many great AppSec minds in one room this week at
#bsimm. I learned a ton and came back with pages of notes to unpack. Great conference! -
Only at
#bsimm do we exchange My First Hack™ stories 'til 5AM —@m1splacedsoul@dewzi@kjdeckpic.twitter.com/HQwNQZxzzw
-
It's actually been a dream of mine for about 8-9 years to present with sammy at
#bsimm. If you've not experienced his intellect, find a way to do so. pic.twitter.com/9LOLRrHAcT
-
- Security and privacy work in service design needs to be able to feed a DevOps pipeline with compatible artifacts (i.e., stories/tasks) - Later in dev, you can piggyback privacy analysis in security threat modeling 2/2
#BSIMM#GDPR#privacyhttps://twitter.com/anttivs/status/1053272718005714955 …Prikaži ovu nit -
Ok, what did I talk about? - Privacy risks, as a mindset and values, could be analysed already at service design / UX phase - Unlike in security, privacy risks do not always have an “attacker” - risks can realise through betrayal of assumptions 1/2
#BSIMM#GDPR#privacyhttps://twitter.com/cigitalgem/status/1052969351723319297 …
Prikaži ovu nit -
-
-
The DevSecOps security person is someone who understands dev, the deployment pipeline, and can write a sensor (that can be as simple as a linter rule, even) to run in the pipeline/prod
@acyrologia#BSIMM -
Dr Chenxi Wang
@chenxiwang is up next as our#BSIMM Conference keynote: application security in the age of application intelligence pic.twitter.com/WBDPm85KpF
-
Gary McGraw
@cigitalgem kicks off the 9th#BSIMM Conference pic.twitter.com/q2u9DtOuJA
-
Look like they meet from apart the world
#bsimm@cigitalgem@mmadou Congrats!!pic.twitter.com/BGL09PCZEq
-
Final stage of my US travel:
#bsimm . After a great@AppSecUS as well as very rewarding@ISC2Congress , up to the industry AppSec knowledge sharing event.#swsec
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.