Q2 TLV Community Blitz @JFrog Welcomes Christina Warren, Sr. Github Advocate
JFrog is a proud host sponsor for this Meetup Event
June 29, 2022
3 min read
JFrog is very excited to host, In-Person, The DevOps Israel Meetup Community and special guest Christina Warren, Senior Developer Advocate at Github. We will also hear from our own Batel Zohar, Developer Advocate at JFrog, and David Melamed, CTO & Co-founder at Jit.
It’ll be fun – so be sure to join us so join us on the 11th Floor of Derech Menachem Begin 156
The Agenda:
18:00 – Arrival / Food & Drinks / Meeting with Friends
18:30 – Talk 1: DevOps TLV – Batel Zohar, JFrog
18:50 – Cloud-Native & OSS – Christina Warren, Github
19:10 – Serverless Nights – David Melamed, Jit
19:15 – Stick Around for More Food + Friends
Batel Zohar, Developer Advocate, JFrog
DevOps Patterns & Antipatterns for Continuous Software Updates
In this talk, we’ll analyze real-world software update fails and how
multiple DevOps patterns, that fit a variety of scenarios, could have saved the developers. Manually making sure that everything works before sending an update and expecting the user to do the acceptance tests before they update is most definitely not on the list of such patterns.
Christina Warren, Senior Developer Advocate, Github
Code to Cloud Roadmap by GitHub
Enhance security, collaboration, and productivity with modern DevOps | Christina Warren | Senior Developer Advocate at GitHub
Code to Cloud is a unique vision by GitHub, curating practices from 83 million developers to streamline technology, talent, culture, and process into a modern DevOps practice aimed at accelerating delivery. In this session, we will demo the next wave of coding, testing, and shipping with any language, any framework, and cloud.
David Melamed, CTO & Co-Founder, Jit
First Line of Defense for the OWASP Serverless Top 10
Serverless architecture has brought a lot of comfort and elegance to software delivery, making it quite appealing for modern application engineering. However, it’s not without its drawbacks. In fact, serverless architecture introduces a whole new set of security implications that should be considered early when building your applications.
The OWASP Serverless Top 10 is an excellent reference for educating practitioners and organizations about the potential security risks and consequences when implementing serverless architecture, as well as how to mitigate these. However, as with all things engineering – if isn’t automated and built into developer workflows, most of the time it just won’t happen.
In this talk, we’ll walk you through the current serverless security state of the union – known methods for securing your serverless applications, the manual methods vs. automated techniques. We’ll wrap up with practical ways for translating these known risks into an automated plan built for any language, tech stack or feature, providing practical methods to take back control and mitigate these known top 10 serverless exploits with code.