
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
A must-read guide to a new and rapidly growing field in cybersecurity
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic triad of people, process, and technology to examine—in depth—every component of DevSecOps. In the book, you'll learn why DevSecOps is as much about people and collaboration as it is about technology and how it impacts every part of our cybersecurity systems.
You'll explore the shared responsibility model at the core of DevSecOps, as well as the people, processes, and technology at the heart of the framework. You'll also find:
- An insightful overview of DevOps and DevSecOps principles and practices
- Strategies for shifting security considerations to the front-end of the development cycle
- Ways that the standard security model has evolved over the years and how it has impacted our approach to cybersecurity
A need-to-read resource for security leaders, security engineers, and privacy practitioners across all industries, The DevSecOps Playbook will also benefit governance, risk, and compliance specialists who seek to better understand how a transformed approach to cybersecurity can impact their business for the better.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- COVER
- TABLE OF CONTENTS
- TITLE PAGE
- FOREWORD
- INTRODUCTION
- CHAPTER 1: Introducing DevSecOps
- CHAPTER 2: The Evolution of Cybersecurity (from Perimeter to Zero Trust)
- CHAPTER 3: DevSecOps People
- CHAPTER 4: DevSecOps Process
- CHAPTER 5: DevSecOps Technology
- CHAPTER 6: DevSecOps Governance
- CHAPTER 7: Driving Transformation in Enterprise Environments
- CHAPTER 8: Measuring DevSecOps
- CHAPTER 9: Conclusion
- ACKNOWLEDGMENTS
- ABOUT THE AUTHOR
- INDEX
- COPYRIGHT
- END USER LICENSE AGREEMENT