Speakers
Synopsis
This session, designed for technology leaders, developers, security professionals, and compliance officers, focuses on how organizations can leverage the DevSecOps approach to develop software that meets data privacy regulations.
Attendees will learn about the importance of embedding privacy considerations into the software development process from the outset. They will understand the role of testing and feedback loops in ensuring that software meets data privacy regulations and allows organizations to identify and remediate privacy issues quickly.
Additionally, the session will explore how DevSecOps provides a framework for implementing security controls throughout the development lifecycle, ensuring that sensitive data is protected from unauthorized access, disclosure, or misuse.
The session will conclude by emphasizing the importance of collaboration between development, security, and privacy teams in achieving data privacy compliance through DevSecOps.
This session will cover the below topics
- Overview of data privacy regulations and their impact on software development.
- The importance of privacy by design and default in software development and how DevSecOps can support this approach.
- How DevSecOps provides a framework for integrating privacy controls into the software development process.
- Best practices for implementing privacy controls such as data encryption, access controls, and anonymization in a DevSecOps environment.
- The role of continuous testing and feedback loops in identifying and remediating privacy issues quickly.
- How DevSecOps can support compliance with data privacy regulations by providing mechanisms for privacy and security controls throughout the development lifecycle.
- Strategies for collaborating between development, security, and privacy teams to achieve data privacy compliance through DevSecOps.
- The importance of monitoring and measuring compliance success and how to achieve it with DevSecOps.
- Challenges and limitations of using DevSecOps to achieve data privacy compliance and how to overcome them.