• Home |
  • ::..CV..:: |
  • Archives |
  • Links |
  • Contact

Tech Show - Paris - 2022 Nov.

Julien Teyssier

Mercredi, 6 septembre 2023

Tech Show - Paris - 2022 Nov.

Posté par Julien Teyssier dans Nouvelles technologies
Commentaires (0) | Rétroliens (0)
Tech Show Paris occurred on November 2022. It is one of the most important technology event for business in France.

Below are the notes I took during this year's edition.
Adopt the DevOps culture to accelerate digital transformation
- Fluidify
- Connecting technology with Business
- 1 Ops in each team
- Cultural difference between the devs and the infrastructure: brings antagonism
- Everyone sees everything: decompartmentalize
- Rethink processes -> have new flows
- Prototype, test, etc: iterative way
- The most important thing is the people and the culture
- End-to-end team responsibility
- Small increments

What cybersecurity strategy in the cloud era?
- Human risks
- Cyber risks
- Little or no training in new technologies: lack of knowledge
- Configure well, don't believe too much that everything is well done and is perfect
- Lack of compartmentalization between customers
- State of the art (Up to date)
- Controls (regular, independent, reactive)
- Trained staff: all staff, people
- Transparency of insurance contracts

How to accelerate the adoption of Devops practices in a heterogeneous international ecosystem?

Same tools for everyone
- Common practices
- Measure and monitored the progress
- Set goals

DevSecOps: Inventory, review of solutions and best practices
DevSecOps:
- Addition of the security part; shared responsibilities
- Automation of security scans
- Don't focus on just one type of defect. Nature of the risk
- Have the greatest coverage -> Goal: 0 manual steps
- CI: Continuous Integration
- Scanners offered by Gitlab
- Detect, plan, integrate security
Sequential DevOps: The security part comes at the end and acts as the police. The dev will try to circumvent the police: non-virtuous circle.
- Ideal pattern: The first vulnerability report comes right after the first commit and before to deploy in the next env.
- Responsibilities are shared
- Approbation rules to deploy in Prod

Deploy Devops on a large scale
Pros and Cons of deploying on a large scale:
+ Reduce time to Market.
- Impact on IT strategy and people during the first implementation -> culture changes
+ Innovate faster
+ Fail faster
What is done in one team will be permeable and will spread to the other teams.
Include those who resist change from the start.
Small increments.
DevSecOps: Security cannot end
Need experts, guru
Trainings
The right to error
Evangelize internally
The 1st step is the hardest


2022 cybercrime trend. How can your business stay safe?
The human is in the foreground
Building a safety/security culture.
Trends:
- Home office
- Ransomware
- Use the supply chain
- AI, Deep fake, synthesized voice
- Event-related phishing
- Increasingly complex attacks
The best phishing attacks use:
- Power of authority
- Social recognition
- COVID updates
Culture of safety. Change behaviors by encouraging people's awareness.
Learn / Train / Act.

Human factors in cybersecurity
- 94% of malware arrives through emails
- 80% by phishing
- We used to say that the guilty person is the one who clicked but everyone has a responsibility
- Need for redundancy
- Overconfidence
- Open discussion without jargon
- 50% of attacks are reported by humans, not by software
- Avoid denial: it's not my job
- Feedback to users
- Security is not the icing on the cake
- Special attention to laziness, copy/paste, simple/short passwords
- Amplifying factors: stress, laziness
- Humans, Trainings, Anticipation, Team effort

How to defend against ransoms and infections?
- Convincing: compliance with rules, laws, etc.
- Permanent strategy regarding the security

Structural process:
- Human processes
- Technical processes

More threats with working from home
A kind of cyber passport to raise awareness from the arrival of an employee and throughout their carrier.

Ease the digital journey through cloud adoption
- Why moving to the cloud: 49% of the application workload is already in the cloud
- End of data center contracts
- Business continuity
- Smooth cash flow
- Cyber threats
- Rapid evolution
- Resource and budget constraints
- Reduce the ownership cost of IT services
- Focus on business needs
- Big data + AI: analysis and decision-making
- Experiment with innovative solutions
- Highly available environments
- Energy cost
- Global shortage
- Step-by-step approach

Debunking common myths about cloud Security
- Rush on the cloud: no security? Lack of user training?
- Misconfiguration: configuration can be done by a developer? Who is the owner of the configuration?
- Abuse of insecure cloud credentials and access rights: Privileges abuse
- Lack of security/safety culture
- CNAPP Cloud Native App Protection Platform: cloud native platform that unifies security
- Responsibility of configuration problems: for the customer or for the provider?
- Automated responses mean loss of control
- Answers versus recommendations
- Some tasks can be safely automated
- One-click action

Voir en PDF: Cet article | Ce mois-ci | Tout le site
 

Rétroliens
Rétrolien spécifique pour ce billet

Pas de rétroliens

Commentaires
Afficher les commentaires en (Vue non groupée | Vue groupée)

Pas de commentaires

Ajouter un commentaire

Marquer un texte en gras: *mot*, souligner un texte: _mot_.
Les smilies standard comme :-) et ;-) sont convertis en images.

Pour éviter le spam par des robits automatisés (spambots), merci d'entrer les caractères que vous voyez dans l'image ci-dessous dans le champ de fomulaire prévu à cet effet. Assurez-vous que votre navigateur gère et accepte les cookies, sinon votre commentaire ne pourra pas être enregistré.
CAPTCHA

 
 

Voir en PDF: Cet article | Ce mois-ci | Tout le site
Recherche rapide
Archives
  • Mars 2026
  • Février 2026
  • Janvier 2026
  • Récentes...
  • Plus anciennes...
Catégories
  • XML Divers
  • XML Formation
  • XML ISTM
  • XML Nouvelles technologies
  • XML Photos
  • XML Univ. de Corse
Calendrier
Précédent Mars '26
Lun. Mar. Mer. Jeu. Ven. Sam. Dim.
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          
Administration du blog
Aller à l'écran d'authentification

Design Downloaded from www.vanillamist.com | Ported to Serendipity by Carl Galloway