Cloud Security , DevSecOps , Next-Generation Technologies & Secure Development

How to Secure the Code Pipeline

James Brotsos of Checkmarx and James Ferguson of AWS on Securing Cloud DevOps
James Brotsos, Checkmarx; James Ferguson, AWS

Amid digital transformation initiatives, the application shift to the cloud has been happening at a historic pace. James Brotsos of Checkmarx and James Ferguson of AWS discuss what this shift means for securing cloud DevOps and what each of their organizations brings to their partnership.

See Also: Live Webinar | Harnessing Google Cloud Data & Analytics with GenAI: Transforming Insights into Action

In a video interview with Information Security Media Group, Brotsos and Ferguson discuss:

  • The cloud DevOps security challenges;
  • How "shift left" affects the code pipeline;
  • How to deal with emerging risks, such as Infrastructure as Code.

Brotsos is a senior solutions engineer at Checkmarx. He has 15 years of network protocol and kernel development experience and a passion for architecting automated solutions that are effective in driving security measures for DevOps organizations, helping them meet their DevSecOps goals.

Ferguson is an AWS senior solutions architect supporting strategic accounts. He works with the security technical field community helping customers address their security and compliance requirements. With over 20 years of experience, he has worked with customers including LinkedIn, Aon Global and Verizon Global, helping them craft and execute on their five-year cloud plans. He built one of the first low-code platforms for mobile and web environments with SAP and Oracle.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.