<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1919858758278392&amp;ev=PageView&amp;noscript=1">

A word from a sponsor - why CMU is such an ADDO fan

It's party time! How to watch ADDO with friends and colleagues

Introducing Club 20: The Heartbeat of All Day DevOps

Spoilers

All Day DevOps 2023 - Code of Conduct

200 Hours to go

All Day DevOps - Code of Conduct

And that’s a wrap!

Keynote - Modern Secure Infrastructure

Keynote: Noelle Silver - Keeping the promise of the cloud

What You Need to Know When Moving Applications From Bare-Metal to the Cloud

Keynote: CAMS Then and Now and the Path Forward

No Silos: Building an Effective DevSecOps Program

Managing Risk with Service Level Objectives and Chaos Engineering

Bicep: The Evolution of Azure ARM

Value Stream Management Improves Customer Value

Reducing Trauma in Production with SLOs and Chaos Engineering

Patterns and Anti-Patterns in SRE Adoption

ADDO - Food for Thought: A Non-Technical View of DevOps

Keynote: Call for Code With the Linux Foundation and Tech for Good

The Proper Way to Build Infrastructure Pipelines

Lessons from Food Shortage to Netflix: Microservices for the Next Billion Users

Lessons From the Trenches: How to Deal With the Challenges of Applying Government DevOps

Continuous Everything? Yes, It’s Possible.

Top Three DevOps Trends for the Future

A DevOps Perspective on IT Infrastructure Management

Another Side of DevOps: Site Reliability Engineering

Cultural Change Is the Key to Successfully Implementing DevOps

Global, Virtual 24-Hour DevOps Event Returns October 28, 2021

Lean in DevOps – An Exponential View for Software Factories

DevSecOps in Federal Government

Scaling DevOps in a 100-Year-Old Enterprise Organisation

Learn to See, Measure and Automate With Value Stream Management

Evolving DevOps in the Age of Kubernetes!

DevSecOps for Managers, Executives, and Mere Mortals

To Traceability & Beyond! Enabling Software Traceability at Scale

Open Source Online DevOps Dojo

"I Have an SLO. Now What?"

How Our “Build Quality In” Initiative Delivered a Zero Defect Release

The Ops in DevOps Is a VERB. It Is Not a Noun!

DevSecOps: Changing the Trajectory of Cybersecurity

How to Fail at Threat Modeling

CI and CD for Documentation

Ask Me Anything Keynote: FinTech

The Well-Architected Way

How To Build Better Software With the Scientific Method

Optimizing Outcomes With Digital Integration

Go Beyond DevSecOps to Continuous Security

Culture: What Is it, How To Change It

Psychological Safety and DevOps

Six Categories of Monitoring in the DevOps Pipeline

Ask Me Anything Keynote: SRE

Fast & Simple: Observing Code & Infra Deployments at Honeycomb

Serverless Databases: The Good, the Bad, and the Ugly

Acing Continuous Testing in DevOps

Ask Me Anything Keynote: CI/CD

Ask Me Anything Keynote: Chaos Engineering

The Unmonitored Failure Domain: Mental Health

Leading a Digital Transformation at the Speed of Government

Mobile DevSecOps: 5 Top Tips From Building Mobile Apps Used by Zillions

Using DevOps Principles To Measure Value Flow

Ask Me Anything Keynote: DevSecOps

Site Reliability Engineering: Anti-Patterns in Everyday Life and What They Teach Us

2020 ADDO: Virtual Viewing Party Guidelines

Building Secure & Reliable Systems: A Conversation with the Authors of Google's SRE Book

Everyone’s WFH. What Does That Mean for No Pants DevSecOps? by Caroline Wong

CI/CD Pipelines for DevSecOps with Hybrid Cloud by Michael Fraser

Kubernetes Journey – How to Upskill Your Team

ZAP in Ten: The Command Line

Swim Don’t Sink: Why Training Matters to an SRE Practice

ZAP in Ten Workshop: All Day DevOps Spring Break Series

Overcoming Inertia At Scale – Moving Government to DevSecOps by Amelie Koran

ZAP in Ten: Active Scan Scripts

ZAP in Ten: Passive Scan Scripts

ZAP in Ten: Proxy and HTTP Sender Scripts

Zap in Ten: Targeted Scripts

Zap in Ten: Introduction to Scripting With Stand Alone Scripts

ZAP in Ten: Authentication - Form Based

ZAP in Ten: Authentication - Basic and Digest

Zap in Ten: Release 2.9

Innersource for Your Enterprise by Jessi Moths

Human or Machine? The Voight-Kampff Test for Discovering Web Application Vulnerabilities by Vanessa Sauter

Continuous Verification and the Myths of Reliability by Casey Rosenthal

How to Be a Strong Leader in Disruptive Times by Charlene Li

Managing a Remote DevOps Team by Mike Hansen, Paula Thrasher & Ross Clanton

The (Air) Force Awakens: From Kessel Run to the Moons of Bespin by Lauren Knausenberger

You’ve Convinced Me We Have To Collaborate — But How The Hell Do We Deal With People? by Matt Stratton

Getting To Know The Entire Cybersecurity Industry for DevOps by Richard Stiennon

Why Happy Developers Create More Secure Code by DJ Schleen & Derek Weeks

Your Kernel and You - How cgroups Make Containers Possible by Marc Cluet

Free DevOps: Hatched in Response to COVID-19

Manual Verification Still Matters

SCA, SAST, CVA, DAST: 4 Common Security Terms Explained

Remote Work Isn't All About the Tools

Marc Cluet - Cultural Approaches to Transformations

Jaclyn Damiano - Making Everyone Visible in Tech

Chris Riley: Did You Try Turning It Off and On?

How the CVSS 3.1 Scoring Model Influences Enterprise Security

Zap in 10: Marketplace

Eliza May Austin - Question Everything

Sladjana Jovanovic and Bill McArthur: From Silos to Communities

Dr. Cherry Vu and Rob England - Kill the Restructure

Ryan Lockard - The Seven Deadly Sins of DevSecOps

Larry Maccherone - Shift Left, Not S#!T Left.

Jaclyn Damiano: Making Everyone Visible in Tech

Shifting Security Left: The Innovation of DevSecOps

Why Code Complexity Matters

10 Posts From 2019 That Preview 2020 Trends

"OWASP Juice Shop: The Ultimate All Vuln WebApp" by Björn Kimminich

Zap in 10: Active Scanning

Zap in 10: Passive Scanning

Zap in 10: The AJAX Spider

Zap in 10: Exploring Your Applications

5 Ways Your Organization Benefits From DevSecOps

Zap in 10: Intro to the Zap HUD

Zap in 10: The Zap Interface

Introducing "Zap in Ten"

Zap in 10: Resource Downloads

How to Engage 4,000 Developers in One Day

All Day DevOps 2019: What to Read

The Future of Software Security and Conversations You'll Need to Have

Kubernetes for Developers

OWASP Top 10 Overview

ZeroTrustOps: Securing at Scale

The Intersection of Communication and Technology

DevSecOps Journey in DoD Enterprise

Establishing an Open Source Program Office

Holding the Industry Accountable

Being Budget Conscious in a Continuously Automated World

Damming a 97 Year Old Waterfall: Transforming to DevOps at State Farm

Observability Made Easy

Breaking Bad: DevOpsSec to DevSecOps

Shifting Security Left: The Innovation of DevSecOps

ADDO ‘19 Keynote Session: Hints & Glimmers Of Things To Come

Upskilling DevOps

There's No Nice Way to Say This: Your DevOps Has Gone Horribly Wrong

ADDO 2019 Keynote Session: Crossing the River by Feeling the Stones

CI/CD for Serverless Applications on AWS

The Three R’s of Software Supply Chains: Reject, Replace, and Respond

Tara Hernandez of Google Talks Code Rush, DevOps

Alanna Brown Discusses Puppet's "State of DevOps" Report

CALMS: A Principle-based DevOps Framework

A Conversation with Gene Kim About The Unicorn Project

Accelerate: A Principle-based DevOps Framework

Is it Time to Trust Equifax Again?

Three Ways: A Principle-based DevOps Framework

Sacha Labourey of CloudBees Looks Ahead at DevSecOps

Workshop Series: Build a Docker Swarm Class Server on AWS

Workshop Series: Manage a Secure Private Docker Registry with Sonatype Nexus and ACM

Workshop Series: Deploy a Highly Available Jenkins Cluster on AWS

Workshop Series: Build an AWS VPC Using Infrastructure as Code

Kubernetes in 10 Seconds

Workshop Series: CI/CD for Microservices and Serverless Functions in AWS

New, Interactive DevSecOps Reference Architecture

DevSecOps: Securing Software in a DevOps World

Delivery Patterns for Rapid & Reliable Software Releases

How Team Autonomy Helps the Enterprise Stay Secure

Make Sure You Cover Your Auth

What is WAF?

Why Does Security Matter For DevOps?

DevSecOps for a Dollar or Less

DevOps-as-a-Service: Overcoming Challenges in Large Organizations

DevSecOps & Chaos Engineering: Knowing the Unknown

How to Protect Apps from BioMetric Security Flaws

How Developers Manage Dependencies Matters (Podcast)

Connected Feedback Loops in Application Security

Microservice Architecture on Kubernetes

Continuous Compliance and DevOps

Security Organizations Need to Start Thinking Like Developers

Software Security is 'Blue By Default'

DevSecOps: 'Just Say No' to the Culture of No’s

Process Oriented Design (POD) Supports DevOps Processes

Connected Feedback Loops in Application Security

DevOps at the US Patent and Trademark Office

Prow, Jenkins X Pipeline Operator, and Tekton: Going Serverless With Jenkins X

DevSecOps: Hope is Not a Strategy

Cloud Native Infrastructure 101 (& 201)

How to Stand Out at the Next All Day DevOps

Learning Curriculum: Based on the All Day DevOps Culture Track

DevOps: Making Life on Earth Fantastic

Continuous Delivery For All

Docker Image Security is Central to DevSecOps

Safely and Swiftly Share Secrets Using DevOps

How to Design Your Teams for Modern Software Development

Using Ocular for Contextual Software Composition Analysis

Developers Must Evolve

Signet — Kay/Jared Jewelers Data Breach: Deconstructing Data Leakage

Protect Containers To Secure Your Business

AWS: Infrastructure as Code

Software Composition Analysis :  Semantic Signatures for CVE/CWEs

Diversity Shouldn’t be a Vanity Project

Disrupt Yourself or Be Disrupted, Right?

The DevSecOps Equilibrium

Business Logic Flaws: One (Bug)Mac please!

Business Logic Flaws: You've Been Breached

Business Logic Flaws: Pusher in a Coinbase Cookie

Business Logic Flaws: Outbidding

Business Logic Flaws: The Channel Partner Attack

Business Logic Flaws: Party Like Its 1999

What is a Business Logic Flaw Vulnerability?