Continuous Assurance and Continuous Compliance via Data, Graph, Query and Code

When:  Dec 18, 2019 from 11:30 to 13:00 (MT)
Associated with  Utah Chapter
Attackers see your digital environment in 3D. They know time is on their side because most vulnerabilities will have to be stumbled upon. For organizations to level the playing field, they need to move from viewing their environment linearly, in two dimensions, to three. To do that, tools need to change. The way data and relationships are mapped needs to change. A graph, not a checklist, is the only way to represent this complexity in a meaningful way. See how LifeOmic streamlines their DevOps process using a graph data model as augmented intelligence to achieve data-driven, automated security operations in the cloud. We'll share our strategy doing a minimum of 20 deploys/week through a continuous security/compliance approach. View it as ‘compliance as code'.

Location

Flemings Prime Steakhouse
The Gateway Mall
20 S 400 W
Salt Lake City, UT 84101