{"id":5714,"date":"2020-06-19T10:16:03","date_gmt":"2020-06-19T08:16:03","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=5714"},"modified":"2022-01-05T20:05:11","modified_gmt":"2022-01-05T19:05:11","slug":"digital-developer-conference-cloud-native-security","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/","title":{"rendered":"Digital Developer Conference: Cloud-Native Security"},"content":{"rendered":"\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-a8a502ba      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable Of Contents\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#digital-developer-conferencecloud-native-security\" class=\"uagb-toc-link__trigger\">Digital Developer ConferenceCloud Native Security<\/a><li class=\"uagb-toc__list\"><a href=\"#istio-lets-you-connect-secure-control-and-observe-services\" class=\"uagb-toc-link__trigger\">Istio lets you connect, secure, control, and observe services.<\/a><li class=\"uagb-toc__list\"><a href=\"#create-your-custom-agenda\" class=\"uagb-toc-link__trigger\">Create your custom agenda<\/a><li class=\"uagb-toc__list\"><a href=\"#digital-developer-conferencecloud-native-security\" class=\"uagb-toc-link__trigger\">Digital Developer ConferenceCloud Native Security<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<div class=\"wp-block-uagb-call-to-action uagb-cta__outer-wrap uagb-block-38905174\"><div class=\"uagb-cta__content-wrap uagb-cta__block uagb-cta__icon-position-right uagb-cta__content-right uagb-cta__content-stacked-tablet uagb-cta__button-valign-middle \"><div class=\"uagb-cta__left-right-wrap\"><div class=\"uagb-cta__content\"><div class=\"uagb-cta__title-wrap\"><h3 class=\"uagb-cta__title\">Digital Developer Conference<br>Cloud Native Security<\/h3><\/div><div class=\"uagb-cta-text-wrap\"><p class=\"uagb-cta__desc\">Taking place on June 24, 25, and July 1 2020, the Digital Developer Conference: Cloud Native Security gives cloud managers the opportunity to develop skills with the leading open-source tools needed to build smart and secure cloud-native applications. Led by subject matter experts from IBM and Red Hat, these sessions and hands-on labs offer beginners and experts alike an opportunity to explore techniques in Application Security, Data Security, and DevSecOps.<\/p><\/div><\/div><div class=\"uagb-cta__link-wrapper uagb-cta__block-link-style\"><div class=\"uagb-cta__button-wrapper\"><a href=\"https:\/\/ibm.co\/3d5KKLI\" class=\"uagb-cta__button-link-wrapper uagb-cta__block-link uagb-cta-typeof-button\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"uagb-cta__link-content-inner\"><span>Get Free Access<\/span><\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<p><span style=\"user-select: auto;\" id=\"urn:enhancement-2bad2bff\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">Cloud Computing<\/span> can help you to respond to\u00a0critical issues that require solving to build smart <span style=\"user-select: auto;\" id=\"urn:enhancement-f9000275\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span> that map your business in a reliable, secure, and agile way. The Digital <span style=\"user-select: auto;\" id=\"urn:enhancement-345c2890\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_developer\">Developer<\/span> Conference: Cloud-Native <span style=\"user-select: auto;\" id=\"urn:enhancement-21681353\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> is a great opportunity to develop <span style=\"user-select: auto;\" id=\"urn:enhancement-d94617d9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/skill\">skills<\/span> with leading <span style=\"user-select: auto;\" id=\"urn:enhancement-54951551\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/open_source\">open-source<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-af27044\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/tool\">tools<\/span> such as <a style=\"user-select: auto;\" href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/cloud-manager\/ibm-cloud-code-to-production-with-no-manual-deployment\/\">IBM Cloud<\/a>, <span style=\"user-select: auto;\" id=\"urn:enhancement-c7fa297a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/red_hat\">Red Hat<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-a6993d7d\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/openshift_2\">Openshift<\/span>, <span style=\"user-select: auto;\" id=\"urn:enhancement-109d190\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/kubernetes\">Kubernetes<\/span>, Istio, and many others. Here is a video about the Conference:<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube aligncenter wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/youtu.be\/RoyF_oqCOmU\n<\/div><\/figure>\n\n\n\n<p>Organised and led by subject matter experts from <span id=\"urn:enhancement-63dcdca3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> and <span id=\"urn:enhancement-e5e4e05d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/red_hat\">Red Hat<\/span>, the sessions and hands-on labs offer beginners and experts alike an opportunity to explore techniques in <span id=\"urn:enhancement-a22d4641\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">Application<\/span> <span id=\"urn:enhancement-65ccecc9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span>, Data <span id=\"urn:enhancement-766e9aa8\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span>, and DevSecOps. <span id=\"urn:enhancement-5b1128db\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">Security<\/span> is critical &#8211; that&#8217;s why this <a rel=\"noreferrer noopener\" href=\"https:\/\/www.codemotion.com\/magazine\/?p=8618\" target=\"_blank\">virtual conference<\/a> combines <span id=\"urn:enhancement-62a44fd3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> with <span id=\"urn:enhancement-9edb387\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">application<\/span> development and <span id=\"urn:enhancement-928701be\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/devops\">DevOps<\/span>. Last year, thousands of developers participated in the conference.\u00a0<\/p>\n\n\n\n<p>The Digital Developer Conference: <span id=\"urn:enhancement-88ef60fb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">Cloud<\/span>-Native <span id=\"urn:enhancement-751bd92e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> lasts over five hours, with many presentations and labs organised in three tracks, and will be held with reference to four different macro-regions: Americas, June 24 ET; Europe and India, June 25; Asia Pacific July 1st.<\/p>\n\n\n\n<p>You can sign-up for <span id=\"urn:enhancement-630155ce\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/free_software\">free<\/span> by <a href=\"https:\/\/ibm.biz\/devcon-security\">clicking here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-application-security-data-security-and-devsecops\">Application Security, Data Security, and DevSecOps<\/h2>\n\n\n\n<p>This conference offers a <span id=\"urn:enhancement-53bcd124\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/free_software\">free<\/span> opportunity to develop <span id=\"urn:enhancement-a566fd0b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/skill\">skills<\/span> with the leading <span id=\"urn:enhancement-e5cceb3e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/open_source\">open-source<\/span> <span id=\"urn:enhancement-a1eeaa99\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/programming_tool\">tools<\/span> and <span id=\"urn:enhancement-814d6ca7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/technology\">technologies<\/span> on <span id=\"urn:enhancement-b950dc5c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> <span id=\"urn:enhancement-4bbde773\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">Cloud<\/span> and <span id=\"urn:enhancement-b56835f1\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/openshift_2\">Red Hat OpenShift<\/span>, enabling you to build smart and secure cloud-native <span id=\"urn:enhancement-5419e3eb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span>. Technical sessions and hands-on labs offer beginners and experts alike an opportunity to explore three dedicated tracks:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Application Security,&nbsp;<\/li><li>Data Security<\/li><li>DevSecOps.<\/li><\/ul>\n\n\n\n<p><span id=\"urn:enhancement-5cc9b879\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">Security<\/span> needs to be managed as an essential pillar in all software and <span id=\"urn:enhancement-1287db28\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/infrastructure\">infrastructure<\/span> development and can be ensured by unlocking the true value of the <span id=\"urn:enhancement-e3573fb3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud\">cloud<\/span>. From modernizing <span id=\"urn:enhancement-2322c11e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span> with <span id=\"urn:enhancement-a58bf633\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/containerization\">containerized<\/span> <span id=\"urn:enhancement-1352df0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microservices_2\">microservices<\/span> to securing <span id=\"urn:enhancement-b72c58be\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> while training <span id=\"urn:local-annotation-128304\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/artificial_intelligence\">AI<\/span> <span id=\"urn:enhancement-1517c437\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/conceptual_model\">models<\/span>, or building continuous, <span id=\"urn:enhancement-335d31ed\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">secure<\/span> <span id=\"urn:enhancement-9bea618a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/devops\">DevOps<\/span> pipelines in an increasingly <span id=\"urn:enhancement-6ce45c01\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/complexity\">complex<\/span> hybrid cloud, <span id=\"urn:enhancement-41215e4e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_developer\">developers<\/span> face a myriad of challenges when it comes to <span id=\"urn:enhancement-49cafa6b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> in a cloud-native hybrid cloud environment. With the right <span id=\"urn:enhancement-1c683aec\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/knowledge\">knowledge<\/span>, <span id=\"urn:enhancement-95163834\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/tool\">tools<\/span> and <span id=\"urn:enhancement-83b9dc85\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/infrastructure\">infrastructure<\/span>, building <span id=\"urn:enhancement-d08b9cc7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">secure<\/span> high-<span id=\"urn:enhancement-c8c87814\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/performance\">performance<\/span> <span id=\"urn:enhancement-6b0e2250\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud\">cloud<\/span> is achievable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-attend\">Why attend?\u00a0<\/h2>\n\n\n\n<p>Staying current is hard work, so <span id=\"urn:enhancement-f40513d2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> and <span id=\"urn:enhancement-b412a7b2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/red_hat\">RedHat<\/span> have made it a little easier. <span id=\"urn:enhancement-6933d392\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> <span id=\"urn:enhancement-d0338372\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_developer\">Developer<\/span> bundles up the best technical info on popular <span id=\"urn:enhancement-61bc0543\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/scrum_software_development\">software development<\/span> topics and delivers it to your inbox. You can get updated with hands-on labs, with achievement reports on offer to confirm your new <span id=\"urn:enhancement-2deb9118\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/skill\">skills<\/span>.<\/p>\n\n\n\n<p>Registration provides you with a <span id=\"urn:enhancement-2468718b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/free_software\">free<\/span> <span id=\"urn:enhancement-da2976a5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> <span id=\"urn:enhancement-81076b64\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">Cloud<\/span> account, so you can jump right in at the moment the conference starts.<\/p>\n\n\n\n<p>Attending the conference means you can learn with proven and popular <span id=\"urn:enhancement-32da0f76\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/open_source\">open-source<\/span> technologies backed by a trusted <span id=\"urn:enhancement-4b0b39f5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/community\">community<\/span>, and you can get coding right away with exercises designed for you by expert <span id=\"urn:enhancement-4e5aa145\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> and <span id=\"urn:enhancement-c1b2e759\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/red_hat\">Red Hat<\/span> developers. This new learning paradigm will empower you in <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/cloud-manager\/cloud-professionals-top-programming-languages\/\" target=\"_blank\" rel=\"noopener\">your next professional challenges<\/a>.<\/p>\n\n\n\n<p>Enjoy the convenience of a <span id=\"urn:enhancement-cb1e7961\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/free_software\">free<\/span>, 100% <span id=\"urn:enhancement-b0bc1974\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/digital_data\">digital<\/span> event, with live and on-demand access post-conference. You can display the proof of your progress with badges for your newly acquired <span id=\"urn:enhancement-3b3df566\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/industry\">industry<\/span>-recognized <span id=\"urn:enhancement-cc357895\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/skill\">skills<\/span> in the field of <span id=\"urn:enhancement-c720c04d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/devops\">DevOps<\/span> and DevSecOps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-devsecops-the-evolution-of-a-species\">DevSecOps, the evolution of a species<\/h2>\n\n\n\n<p>It is no longer enough for <span id=\"urn:enhancement-762a77ae\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/educational_technology\">ICT<\/span> practitioners to simply develop a long-term maintainable code <span id=\"urn:enhancement-ef16c0d2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/infrastructure\">infrastructure<\/span> and then hand <span id=\"urn:enhancement-411aaaed\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> off to another <span id=\"urn:enhancement-c938a5aa\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/team\">team<\/span>. <span id=\"urn:enhancement-e6da6522\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">Security<\/span> has remained a separate practice for too long, and <a href=\"https:\/\/www.devsecops.org\/\">DevSecOps<\/a> takes it\u2019s name from <span id=\"urn:enhancement-b6feb02c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/devops\">DevOps<\/span>, providing a philosophy and a framework for an integrated, united effort when it comes to <span id=\"urn:enhancement-44e0c240\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>, which should be embedded in the <span id=\"urn:enhancement-d2039235\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/organization\">organisation<\/span> from the very first code.\u00a0<\/p>\n\n\n\n<p>DevSecOps is a better way for <span id=\"urn:enhancement-43fcf3cf\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> practitioners to operate and contribute value with less friction. We know we must adapt our ways quickly and foster <span id=\"urn:enhancement-ea72b9e9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/innovation\">innovation<\/span> to ensure that <span id=\"urn:enhancement-10c2ce5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> <span id=\"urn:enhancement-28c3cad0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> and <span id=\"urn:enhancement-a6e45cc6\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/privacy\">privacy<\/span> issues are not left behind because we were too slow to change.<\/p>\n\n\n\n<p>By developing <span id=\"urn:enhancement-94b6fafe\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> as code, we strive to create awesome products and services, provide direct insights to <span id=\"urn:enhancement-4a9a5011\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_developer\">developers<\/span>, and generally favour iteration over always trying to  come up with the best answer before a <span id=\"urn:enhancement-2d43c5b2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_deployment\">deployment<\/span>. <span id=\"urn:enhancement-7e025cf1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">Security<\/span> and compliance will become available to be consumed as services. We will unlock and unblock new paths to help others see their <span id=\"urn:enhancement-7ebf537e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/idea\">ideas<\/span> become a reality.<\/p>\n\n\n\n<p>In our <span id=\"urn:enhancement-fca1424\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>-first efforts, we can&#8217;t simply rely on scanners and reports to make code better. We will <span id=\"urn:enhancement-251f7123\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attack<\/span> products and services like an outsider, to help you work out how best to defend what you&#8217;ve created. We will learn the loopholes, look for weaknesses, and we will work with you to provide remediation actions instead of long lists of problems for you to solve on your own.<\/p>\n\n\n\n<p>We will not wait for our <span id=\"urn:enhancement-f75f207d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/organization\">organisations<\/span> to fall victim to mistakes and attackers. We will not settle for finding what is already known; instead, we will look for anomalies yet to be detected. We will strive to be a better partner by valuing what you value<strong>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-react-when-you-re-gonna-code\">React, when you&#8217;re gonna code!<\/h2>\n\n\n\n<p><span id=\"urn:enhancement-c26b1eac\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/code_cryptography\">Code<\/span> and infrastructure development require an ever-increasing time and planning capability. New challenges appear abruptly and a good professional needs to react immediately. &#8220;Learn the <span id=\"urn:enhancement-701a058b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/skill\">skills<\/span> to react with speed and confidence by using solutions on <span id=\"urn:enhancement-ece3407\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> <span id=\"urn:enhancement-4110d63f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">Cloud<\/span> and <span id=\"urn:enhancement-49941a0f\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/openshift_2\">Red Hat OpenShift<\/span> alongside leading <span id=\"urn:enhancement-e705c0d5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/open_source\">open source<\/span> contributions by <span id=\"urn:enhancement-1b8fdf9d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span> and <span id=\"urn:enhancement-e8ca17dc\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/red_hat\">Red Hat<\/span> to <span id=\"urn:enhancement-5cc1cf9d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/kubernetes\">Kubernetes<\/span>, Istio, Open Container Initiative, <span id=\"urn:enhancement-fe7e539b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cloud_computing\">Cloud<\/span> Native Computing Foundation, and Apache Foundation,&#8221; says Willie Tejada, GM &amp; Chief Developer Advocate of <span id=\"urn:enhancement-23569316\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ibm\">IBM<\/span>, in his <a href=\"https:\/\/developer.ibm.com\/blogs\/free-cloud-native-security-conference-hosted-by-ibm-developer\/\">introductory blog post<\/a> for this virtual conference.<\/p>\n\n\n\n<p>&#8220;Choose the track and session for the cloud-native <span id=\"urn:enhancement-4dd14a93\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/skill\">skills<\/span> you need today to build the smart, secure <span id=\"urn:enhancement-13009298\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span> of tomorrow,&#8221; writes Tehaja.<\/p>\n\n\n\n<p>&nbsp;Here are just a few of the featured technical sessions, keynotes, and hands-on labs:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Deep-dive into data-in-motion encryption with Istio auto mTLS and key management;<\/li><li>From hardware root of trust (RoT) to containers: Running trusted containers on a high assurance OpenShift platform;<\/li><li>Kubernetes networking to control access with network policy, Calico, NodePort, \u00a0\u00a0\u00a0 LoadBalancer, and Ingress;<\/li><li>Adding secure encrypted object storage, persistent volume to a MongoDB with S3FS-Fuse;<\/li><li>Source-to-Image (S2I) secure deployment with UBI, custom builder, and runtime images and templates;<\/li><li>IBM Garage best practices: Developing secure applications for enterprise clients.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-go-istio\">Go Istio<\/h2>\n\n\n\n<p>In contrast with the old monolithic applications, a cloud native approach provides great convenience. However, there\u2019s no denying that cloud adoption can put strains on <span id=\"urn:enhancement-65b2a034\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/devops\">DevOps<\/span> teams undergoing a period of change. Developers must use <span id=\"urn:enhancement-9199c48f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microservices_2\">microservices<\/span> to architect for portability, while operators must manage extremely large hybrid and multi-cloud deployments.<\/p>\n\n\n\n<p>The fusion between developers and operations is rewarding, but at the same time very demanding and fast-changing. Fortunately the software environment is creating products that help ease this integration &#8211; that\u2019s exactly where Istio comes into the picture, in software production.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-istio-lets-you-connect-secure-control-and-observe-services\"><a href=\"http:\/\/istio.io\"><strong>Istio<\/strong><\/a><strong> lets you connect, secure, control, and observe services.<\/strong><\/h3>\n\n\n\n<p>At a high level, Istio helps reduce the <span id=\"urn:enhancement-1ef3391a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/complexity\">complexity<\/span> of <span id=\"urn:enhancement-4831d7ba\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/software_deployment\">deployment<\/span>. Istio is a completely <span id=\"urn:enhancement-ba09c27f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/open_source\">open-source<\/span> <span id=\"urn:enhancement-eb33fc7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/service_systems_architecture\">service<\/span> mesh that layers transparently onto existing distributed <span id=\"urn:enhancement-5c6b4d2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span>. It is also a platform, including <span id=\"urn:enhancement-c6209e52\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_programming_interface\">APIs<\/span> that allow it to integrate into any logging platform, <span id=\"urn:enhancement-ef67b089\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/telemetry\">telemetry<\/span>, or policy system. Its diverse feature set lets you successfully (and efficiently!) run a distributed microservice architecture, and provides a uniform way to secure, connect, and monitor microservices. Istio addresses the challenges developers and operators face as <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/backend-dev\/how-to-transition-from-monolithic-systems-to-microservices-with-hexagonal-architecture\/\" target=\"_blank\" rel=\"noopener\">monolithic applications transition towards a distributed microservice architecture<\/a>. Let\u2019s take a more detailed look at Istio\u2019s <span id=\"urn:enhancement-87c867a2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/service_systems_architecture\">service<\/span> mesh:<\/p>\n\n\n\n<p>The term <span id=\"urn:enhancement-19fbbb92\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/service_systems_architecture\">service<\/span> mesh is used to describe the network of <span id=\"urn:enhancement-62e37cc9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microservices_2\">microservices<\/span> that make up such <span id=\"urn:enhancement-d118c6b1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span> and the <span id=\"urn:enhancement-6cf49c16\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/interaction\">interactions<\/span> between them. As a service mesh grows in size and complexity, it can become harder to understand and manage. Its requirements can include discovery, load balancing, failure recovery, metrics, and monitoring. A service mesh often also has more complex operational requirements, like <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/designer-cxo\/multi-armed-bandits-a-better-way-to-a-b-test\/\" class=\"ek-link\"><span id=\"urn:local-annotation-571604\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/a_b_testing\">A\/B testing<\/span><\/a>, canary rollouts, rate limiting, access control, or end-to-end authentication.<\/p>\n\n\n\n<p>Istio provides behavioral insights and operational control over the service mesh as a whole, offering a complete solution to satisfy the diverse requirements of microservice applications.<\/p>\n\n\n\n<p>You can add Istio support to services by deploying a special sidecar proxy throughout your environment. This intercepts all network communication between microservices, then you can configure and manage Istio using its control plane functionality to manage automatic load balancing, fine-grained control of traffic behavior, a pluggable policy layer, configuration API and many more <a href=\"https:\/\/istio.io\/\">metrics and services<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-create-your-custom-agenda\">Create your custom agenda<\/h3>\n\n\n\n<p>Digital Developer Conference: Cloud Native Security has been built for a global audience, respecting the different needs of each macro-region. Enrolled participants can choose from our regional viewings. During the conference, participants are free to jump from track to track, creating a personalised agenda according to individual needs and interests.\u00a0<\/p>\n\n\n\n<p>The conference tracks and tools allow the building of smart, secure applications, mixing different architectural paradigms. Whether modernizing applications with containerized microservices, securing data in a smart cloud or building continuous, secure DevOps pipelines in an increasingly complex hybrid cloud, you\u2019ll gain confidence to face the challenge thanks to the skills gained from IBM Cloud and Red Hat OpenShift alongside popular open-source technologies like Kubernetes and Istio.<\/p>\n\n\n\n<p>Participants will learn how to use leading open-source tools, discover best practices from experts, and join in with hands-on labs in three dedicated tracks:<\/p>\n\n\n\n<p><strong>Application Security<\/strong>: Securing containerized applications on Kubernetes or microservices. Includes configuration, policies, and app governance, and APIs.<\/p>\n\n\n\n<p><strong>Data Security<\/strong>: Securing your application data and analytics. Includes privacy, data storage, encryption, AI\/<span id=\"urn:local-annotation-154960\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/machine_learning\">ML<\/span>, and <span id=\"urn:local-annotation-738723\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/national_institute_of_standards_and_technology\">NIST<\/span> controls.<\/p>\n\n\n\n<p><strong>DevSecOps<\/strong>: Building a secure <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/cloud-manager\/ci-cd-automation-for-fn-project-with-oracle-faas-and-developer-cloud-service\/\" class=\"ek-link\">CI\/CD<\/a> pipeline. Includes <span id=\"urn:local-annotation-16082\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system_integration\">integration<\/span>, <span id=\"urn:local-annotation-213175\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/unit_testing\">testing<\/span>, <span id=\"urn:local-annotation-498442\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span> scanning, image governance, and automation.<\/p>\n\n\n\n<p>We know you\u2019ll want to join the Digital Developer Conference: Cloud Native Security, so <a style=\"user-select: auto;\" href=\"https:\/\/developer.ibm.com\/conferences\/digital-developer-conference-security\/\">register<\/a> your interest, and we\u2019ll see you there!<\/p>\n\n\n\n<div class=\"wp-block-uagb-call-to-action uagb-cta__outer-wrap uagb-block-e7e2d9b7\"><div class=\"uagb-cta__content-wrap uagb-cta__block uagb-cta__icon-position-right uagb-cta__content-right uagb-cta__content-stacked-tablet uagb-cta__button-valign-middle \"><div class=\"uagb-cta__left-right-wrap\"><div class=\"uagb-cta__content\"><div class=\"uagb-cta__title-wrap\"><h3 class=\"uagb-cta__title\">Digital Developer Conference<br>Cloud Native Security<\/h3><\/div><div class=\"uagb-cta-text-wrap\"><p class=\"uagb-cta__desc\">Taking place on June 24, 25, and July 1 2020, the Digital Developer Conference: Cloud Native Security gives cloud managers the opportunity to develop skills with the leading open-source tools needed to build smart and secure cloud-native applications. Led by subject matter experts from IBM and Red Hat, these sessions and hands-on labs offer beginners and experts alike an opportunity to explore techniques in Application Security, Data Security, and DevSecOps.<\/p><\/div><\/div><div class=\"uagb-cta__link-wrapper uagb-cta__block-link-style\"><div class=\"uagb-cta__button-wrapper\"><a href=\"https:\/\/ibm.co\/3d5KKLI\" class=\"uagb-cta__button-link-wrapper uagb-cta__block-link uagb-cta-typeof-button\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"uagb-cta__link-content-inner\"><span>Get Free Access<\/span><\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Cloud Computing can help you to respond to\u00a0critical issues that require solving to build smart applications that map your business in a reliable, secure, and agile way. The Digital Developer Conference: Cloud-Native Security is a great opportunity to develop skills with leading open-source tools such as IBM Cloud, Red Hat Openshift, Kubernetes, Istio, and many&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/\">Read more<\/a><\/p>\n","protected":false},"author":8,"featured_media":6044,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[5244],"tags":[5221],"collections":[],"class_list":{"0":"post-5714","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud","8":"tag-ibm","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Digital Developer Conference: Cloud-Native Security (video) - Codemotion<\/title>\n<meta name=\"description\" content=\"The Digital Developer Conference: Cloud-Native Security is a unique opportunity to learn tools such as IBM Cloud, Openshift, Kubernetes, and many others.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Developer Conference: Cloud-Native Security\" \/>\n<meta property=\"og:description\" content=\"The Digital Developer Conference: Cloud-Native Security is a unique opportunity to learn tools such as IBM Cloud, Openshift, Kubernetes, and many others.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T08:16:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-05T19:05:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1011\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leo Sorge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leo Sorge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/\"},\"author\":{\"name\":\"Leo Sorge\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/99fe84861e17797989e16094aac727d5\"},\"headline\":\"Digital Developer Conference: Cloud-Native Security\",\"datePublished\":\"2020-06-19T08:16:03+00:00\",\"dateModified\":\"2022-01-05T19:05:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/\"},\"wordCount\":1751,\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/pexels-photo-1181354.jpeg\",\"keywords\":[\"IBM\"],\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/\",\"name\":\"Digital Developer Conference: Cloud-Native Security (video) - Codemotion\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/pexels-photo-1181354.jpeg\",\"datePublished\":\"2020-06-19T08:16:03+00:00\",\"dateModified\":\"2022-01-05T19:05:11+00:00\",\"description\":\"The Digital Developer Conference: Cloud-Native Security is a unique opportunity to learn tools such as IBM Cloud, Openshift, Kubernetes, and many others.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/pexels-photo-1181354.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/pexels-photo-1181354.jpeg\",\"width\":1011,\"height\":675,\"caption\":\"cloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/digital-developer-conference-cloud-native-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevOps\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/devops\\\/cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Digital Developer Conference: Cloud-Native Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Codemotion.Italy\\\/\",\"https:\\\/\\\/x.com\\\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/99fe84861e17797989e16094aac727d5\",\"name\":\"Leo Sorge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"caption\":\"Leo Sorge\"},\"description\":\"I hold a degree in electronics. I talk and write about science and technology in both real and close-to-real worlds since 1976. I frankly believe that business plan and singularity are excellent starts for science-fiction stories.\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/author\\\/leo-sorge\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital Developer Conference: Cloud-Native Security (video) - Codemotion","description":"The Digital Developer Conference: Cloud-Native Security is a unique opportunity to learn tools such as IBM Cloud, Openshift, Kubernetes, and many others.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/","og_locale":"en_US","og_type":"article","og_title":"Digital Developer Conference: Cloud-Native Security","og_description":"The Digital Developer Conference: Cloud-Native Security is a unique opportunity to learn tools such as IBM Cloud, Openshift, Kubernetes, and many others.","og_url":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2020-06-19T08:16:03+00:00","article_modified_time":"2022-01-05T19:05:11+00:00","og_image":[{"width":1011,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg","type":"image\/jpeg"}],"author":"Leo Sorge","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Leo Sorge","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/"},"author":{"name":"Leo Sorge","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5"},"headline":"Digital Developer Conference: Cloud-Native Security","datePublished":"2020-06-19T08:16:03+00:00","dateModified":"2022-01-05T19:05:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/"},"wordCount":1751,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg","keywords":["IBM"],"articleSection":["Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/","url":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/","name":"Digital Developer Conference: Cloud-Native Security (video) - Codemotion","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg","datePublished":"2020-06-19T08:16:03+00:00","dateModified":"2022-01-05T19:05:11+00:00","description":"The Digital Developer Conference: Cloud-Native Security is a unique opportunity to learn tools such as IBM Cloud, Openshift, Kubernetes, and many others.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg","width":1011,"height":675,"caption":"cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/digital-developer-conference-cloud-native-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"DevOps","item":"https:\/\/www.codemotion.com\/magazine\/devops\/"},{"@type":"ListItem","position":3,"name":"Cloud","item":"https:\/\/www.codemotion.com\/magazine\/devops\/cloud\/"},{"@type":"ListItem","position":4,"name":"Digital Developer Conference: Cloud-Native Security"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5","name":"Leo Sorge","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","caption":"Leo Sorge"},"description":"I hold a degree in electronics. I talk and write about science and technology in both real and close-to-real worlds since 1976. I frankly believe that business plan and singularity are excellent starts for science-fiction stories.","url":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-600x400.jpeg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-600x600.jpeg","author_info":{"display_name":"Leo Sorge","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg",1011,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-150x150.jpeg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-300x200.jpeg",300,200,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-768x513.jpeg",768,513,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg",1011,675,false],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg",1011,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg",1011,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354.jpeg",100,67,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-180x128.jpeg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-896x504.jpeg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-400x225.jpeg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-600x400.jpeg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/pexels-photo-1181354-600x600.jpeg",600,600,true]},"uagb_author_info":{"display_name":"Leo Sorge","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"},"uagb_comment_info":0,"uagb_excerpt":"Cloud Computing can help you to respond to\u00a0critical issues that require solving to build smart applications that map your business in a reliable, secure, and agile way. The Digital Developer Conference: Cloud-Native Security is a great opportunity to develop skills with leading open-source tools such as IBM Cloud, Red Hat Openshift, Kubernetes, Istio, and many&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/5714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=5714"}],"version-history":[{"count":9,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/5714\/revisions"}],"predecessor-version":[{"id":15543,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/5714\/revisions\/15543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/6044"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=5714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=5714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=5714"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=5714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}