ADDO BEGINS IN
Days :
Hours :
Minutes :
Seconds
WATCH ON DEMAND ▸
ABOUT
SPEAKERS
COMMUNITY
On Demand
Join ADDO on Slack
Code of Conduct
ADDO Blog
Club 20
Supporters
ADDO SPONSORED BY:
View All Speakers
Keynotes
CI/CD Continuous Everything
Modern Infrastructure
DevSecOps
Cultural Transformations
Site Reliability Engineering
Software Supply Chain
ADDO SPONSORED BY:
Video Playlists
ADDO Blog
ADDO SPONSORED BY:
SCHEDULE
ADDO SPONSORED BY:
REGISTER
ABOUT
SPEAKERS
Keynotes
CI/CD
Modern Infrastructure
DevSecOps
Cultural Transformations
Site Reliability Engineering
Software Supply Chain
View All Speakers
SCHEDULE
COMMUNITY
Join ADDO on Slack
Code of Conduct
ADDO Blog
Club 20
Supporters
REGISTER
All Day DevOps Blog
A word from a sponsor - why CMU is such an ADDO fan
It's party time! How to watch ADDO with friends and colleagues
Introducing Club 20: The Heartbeat of All Day DevOps
Spoilers
All Day DevOps 2023 - Code of Conduct
200 Hours to go
All Day DevOps - Code of Conduct
And that’s a wrap!
Keynote - Modern Secure Infrastructure
Keynote: Noelle Silver - Keeping the promise of the cloud
What You Need to Know When Moving Applications From Bare-Metal to the Cloud
Keynote: CAMS Then and Now and the Path Forward
No Silos: Building an Effective DevSecOps Program
Managing Risk with Service Level Objectives and Chaos Engineering
Bicep: The Evolution of Azure ARM
Value Stream Management Improves Customer Value
Reducing Trauma in Production with SLOs and Chaos Engineering
Patterns and Anti-Patterns in SRE Adoption
ADDO - Food for Thought: A Non-Technical View of DevOps
Keynote: Call for Code With the Linux Foundation and Tech for Good
The Proper Way to Build Infrastructure Pipelines
Lessons from Food Shortage to Netflix: Microservices for the Next Billion Users
Lessons From the Trenches: How to Deal With the Challenges of Applying Government DevOps
Continuous Everything? Yes, It’s Possible.
Top Three DevOps Trends for the Future
A DevOps Perspective on IT Infrastructure Management
Another Side of DevOps: Site Reliability Engineering
Cultural Change Is the Key to Successfully Implementing DevOps
Global, Virtual 24-Hour DevOps Event Returns October 28, 2021
Lean in DevOps – An Exponential View for Software Factories
DevSecOps in Federal Government
Scaling DevOps in a 100-Year-Old Enterprise Organisation
Learn to See, Measure and Automate With Value Stream Management
Evolving DevOps in the Age of Kubernetes!
DevSecOps for Managers, Executives, and Mere Mortals
To Traceability & Beyond! Enabling Software Traceability at Scale
Open Source Online DevOps Dojo
"I Have an SLO. Now What?"
How Our “Build Quality In” Initiative Delivered a Zero Defect Release
The Ops in DevOps Is a VERB. It Is Not a Noun!
DevSecOps: Changing the Trajectory of Cybersecurity
How to Fail at Threat Modeling
CI and CD for Documentation
Ask Me Anything Keynote: FinTech
The Well-Architected Way
How To Build Better Software With the Scientific Method
Optimizing Outcomes With Digital Integration
Go Beyond DevSecOps to Continuous Security
Culture: What Is it, How To Change It
Psychological Safety and DevOps
Six Categories of Monitoring in the DevOps Pipeline
Ask Me Anything Keynote: SRE
Fast & Simple: Observing Code & Infra Deployments at Honeycomb
Serverless Databases: The Good, the Bad, and the Ugly
Acing Continuous Testing in DevOps
Ask Me Anything Keynote: CI/CD
Ask Me Anything Keynote: Chaos Engineering
The Unmonitored Failure Domain: Mental Health
Leading a Digital Transformation at the Speed of Government
Mobile DevSecOps: 5 Top Tips From Building Mobile Apps Used by Zillions
Using DevOps Principles To Measure Value Flow
Ask Me Anything Keynote: DevSecOps
Site Reliability Engineering: Anti-Patterns in Everyday Life and What They Teach Us
2020 ADDO: Virtual Viewing Party Guidelines
Building Secure & Reliable Systems: A Conversation with the Authors of Google's SRE Book
Everyone’s WFH. What Does That Mean for No Pants DevSecOps? by Caroline Wong
CI/CD Pipelines for DevSecOps with Hybrid Cloud by Michael Fraser
Kubernetes Journey – How to Upskill Your Team
ZAP in Ten: The Command Line
Swim Don’t Sink: Why Training Matters to an SRE Practice
ZAP in Ten Workshop: All Day DevOps Spring Break Series
Overcoming Inertia At Scale – Moving Government to DevSecOps by Amelie Koran
ZAP in Ten: Active Scan Scripts
ZAP in Ten: Passive Scan Scripts
ZAP in Ten: Proxy and HTTP Sender Scripts
Zap in Ten: Targeted Scripts
Zap in Ten: Introduction to Scripting With Stand Alone Scripts
ZAP in Ten: Authentication - Form Based
ZAP in Ten: Authentication - Basic and Digest
Zap in Ten: Release 2.9
Innersource for Your Enterprise by Jessi Moths
Human or Machine? The Voight-Kampff Test for Discovering Web Application Vulnerabilities by Vanessa Sauter
Continuous Verification and the Myths of Reliability by Casey Rosenthal
How to Be a Strong Leader in Disruptive Times by Charlene Li
Managing a Remote DevOps Team by Mike Hansen, Paula Thrasher & Ross Clanton
The (Air) Force Awakens: From Kessel Run to the Moons of Bespin by Lauren Knausenberger
You’ve Convinced Me We Have To Collaborate — But How The Hell Do We Deal With People? by Matt Stratton
Getting To Know The Entire Cybersecurity Industry for DevOps by Richard Stiennon
Why Happy Developers Create More Secure Code by DJ Schleen & Derek Weeks
Your Kernel and You - How cgroups Make Containers Possible by Marc Cluet
Free DevOps: Hatched in Response to COVID-19
Manual Verification Still Matters
SCA, SAST, CVA, DAST: 4 Common Security Terms Explained
Remote Work Isn't All About the Tools
Marc Cluet - Cultural Approaches to Transformations
Jaclyn Damiano - Making Everyone Visible in Tech
Chris Riley: Did You Try Turning It Off and On?
How the CVSS 3.1 Scoring Model Influences Enterprise Security
Zap in 10: Marketplace
Eliza May Austin - Question Everything
Sladjana Jovanovic and Bill McArthur: From Silos to Communities
Dr. Cherry Vu and Rob England - Kill the Restructure
Ryan Lockard - The Seven Deadly Sins of DevSecOps
Larry Maccherone - Shift Left, Not S#!T Left.
Jaclyn Damiano: Making Everyone Visible in Tech
Shifting Security Left: The Innovation of DevSecOps
Why Code Complexity Matters
10 Posts From 2019 That Preview 2020 Trends
"OWASP Juice Shop: The Ultimate All Vuln WebApp" by Björn Kimminich
Zap in 10: Active Scanning
Zap in 10: Passive Scanning
Zap in 10: The AJAX Spider
Zap in 10: Exploring Your Applications
5 Ways Your Organization Benefits From DevSecOps
Zap in 10: Intro to the Zap HUD
Zap in 10: The Zap Interface
Introducing "Zap in Ten"
Zap in 10: Resource Downloads
How to Engage 4,000 Developers in One Day
All Day DevOps 2019: What to Read
The Future of Software Security and Conversations You'll Need to Have
Kubernetes for Developers
OWASP Top 10 Overview
ZeroTrustOps: Securing at Scale
The Intersection of Communication and Technology
DevSecOps Journey in DoD Enterprise
Establishing an Open Source Program Office
Holding the Industry Accountable
Being Budget Conscious in a Continuously Automated World
Damming a 97 Year Old Waterfall: Transforming to DevOps at State Farm
Observability Made Easy
Breaking Bad: DevOpsSec to DevSecOps
Shifting Security Left: The Innovation of DevSecOps
ADDO ‘19 Keynote Session: Hints & Glimmers Of Things To Come
Upskilling DevOps
There's No Nice Way to Say This: Your DevOps Has Gone Horribly Wrong
ADDO 2019 Keynote Session: Crossing the River by Feeling the Stones
CI/CD for Serverless Applications on AWS
The Three R’s of Software Supply Chains: Reject, Replace, and Respond
Tara Hernandez of Google Talks Code Rush, DevOps
Alanna Brown Discusses Puppet's "State of DevOps" Report
CALMS: A Principle-based DevOps Framework
A Conversation with Gene Kim About The Unicorn Project
Accelerate: A Principle-based DevOps Framework
Is it Time to Trust Equifax Again?
Three Ways: A Principle-based DevOps Framework
Sacha Labourey of CloudBees Looks Ahead at DevSecOps
Workshop Series: Build a Docker Swarm Class Server on AWS
Workshop Series: Manage a Secure Private Docker Registry with Sonatype Nexus and ACM
Workshop Series: Deploy a Highly Available Jenkins Cluster on AWS
Workshop Series: Build an AWS VPC Using Infrastructure as Code
Kubernetes in 10 Seconds
Workshop Series: CI/CD for Microservices and Serverless Functions in AWS
New, Interactive DevSecOps Reference Architecture
DevSecOps: Securing Software in a DevOps World
Delivery Patterns for Rapid & Reliable Software Releases
How Team Autonomy Helps the Enterprise Stay Secure
Make Sure You Cover Your Auth
What is WAF?
Why Does Security Matter For DevOps?
DevSecOps for a Dollar or Less
DevOps-as-a-Service: Overcoming Challenges in Large Organizations
DevSecOps & Chaos Engineering: Knowing the Unknown
How to Protect Apps from BioMetric Security Flaws
How Developers Manage Dependencies Matters (Podcast)
Connected Feedback Loops in Application Security
Microservice Architecture on Kubernetes
Continuous Compliance and DevOps
Security Organizations Need to Start Thinking Like Developers
Software Security is 'Blue By Default'
DevSecOps: 'Just Say No' to the Culture of No’s
Process Oriented Design (POD) Supports DevOps Processes
Connected Feedback Loops in Application Security
DevOps at the US Patent and Trademark Office
Prow, Jenkins X Pipeline Operator, and Tekton: Going Serverless With Jenkins X
DevSecOps: Hope is Not a Strategy
Cloud Native Infrastructure 101 (& 201)
How to Stand Out at the Next All Day DevOps
Learning Curriculum: Based on the All Day DevOps Culture Track
DevOps: Making Life on Earth Fantastic
Continuous Delivery For All
Docker Image Security is Central to DevSecOps
Safely and Swiftly Share Secrets Using DevOps
How to Design Your Teams for Modern Software Development
Using Ocular for Contextual Software Composition Analysis
Developers Must Evolve
Signet — Kay/Jared Jewelers Data Breach: Deconstructing Data Leakage
Protect Containers To Secure Your Business
AWS: Infrastructure as Code
Software Composition Analysis : Semantic Signatures for CVE/CWEs
Diversity Shouldn’t be a Vanity Project
Disrupt Yourself or Be Disrupted, Right?
The DevSecOps Equilibrium
Business Logic Flaws: One (Bug)Mac please!
Business Logic Flaws: You've Been Breached
Business Logic Flaws: Pusher in a Coinbase Cookie
Business Logic Flaws: Outbidding
Business Logic Flaws: The Channel Partner Attack
Business Logic Flaws: Party Like Its 1999
What is a Business Logic Flaw Vulnerability?