DevOps and DevSecOps
User Conference
November 15th
| Hotel InterContinental London Park Lane
Join us at
JFrog’s DevSecOps Day EMEA
DevOps and DevSecOps teams are required to stay ahead and be prepared for the unexpected challenges coming their way.
With in-person keynotes, breakout sessions, technical workshops and networking with other industry professionals you will gain the practical knowledge and insights you need to be prepared for 2024 challenges.
The event is FREE OF CHARGE.
Please RSVP by filling out the form. The number of seats are limited, so hurry up to confirm your spot!
Who Should Attend DevSecOps Day EMEA?
Event Will Start in
speakers

Asaf Karas
CTO, SVP
Security

YOSSI SHAUL
SVP
JFrog DevOps

Eyal Rudnik
SVP
EMEA Sales

Shachar Menashe
Director of Threat Research

Or Yaacov
VP of SolutionS
Engineering
Our Plan For The Event
Keynote
The evolution from DevOps and CI/CD to cloud-native technologies, microservices architecture, security and governance – and now all the way to automation and Artificial Intelligence – requires a new generation of SSC management that aims to deliver software faster, with higher quality, enhanced security, and improved customer experiences. In this session, we’ll share insights from over 7,000 JFrog customers, and what the F100 list tells us about where the software supply chain is headed. Get Ready for Next!
Keynote
Managing and securing the software supply chain end-to-end is one of the most difficult challenges facing DevOps and DevSecOps teams today. As developers continue to push all boundaries on the left and right side of the software release cycle, enterprise focus remains on binaries, and their movement through the pipeline automatically and securely. See how an integrated, consistent platform approach is the only way to solve next-gen supply chain challenges!
10:30 AM
Developers are now the target of the attacker, with binaries available publicly. While it’s unlikely that the concept of security point solutions will completely disappear, it’s clear that the market is demanding a consolidated, comprehensive approach to pipeline security across the attack surface. With the increasing complexity of software supply chains, security and governance are becoming critical on developer’s machines, at the C-level and in boardrooms. Next-gen software supply chain solutions must incorporate robust, holistic security or risk being the next tool to be consolidated. See brand-new demonstrations of the DevOps-centric approach to security that will drive the pipelines of tomorrow.
Keynote
There are a number of metrics that can be used to get a better understanding of the vulnerabilities that may be present in software. There is the Common Weakness Scoring System (CWSS), the Exploitability Index (EI), and the National Vulnerability Database (NVD) which includes the Common Vulnerability Enumeration (CVE). With all of the metrics how do you determine what vulnerabilities exist in your software?
In this session, we will explain some of the most used metrics in security and walk through real-world CVE examples, highlighting instances and entire categories where CVSSv3.1 falls short of providing an accurate score, both due to its design and its various flaws. The session will also cover specific indicators in the CVE description that can increase the confidence in a CVSS rating, and vice versa.
Session
A FREE training of best practices and hands-on workshop to enhance your DevOps and DevSecOps knowledge. Learn how to mitigate risks and exposures in your software supply chain! Attacks on the open-source supply chain are becoming more sophisticated and software developers are becoming the main target of these attacks.
This FREE hands-on training covers how JFrog platform helps Organizations to make it possible to develop and deploy artifacts across multiple geographical locations (multi-sites).
As part of the growing demand for end-to-end software supply chain solutions, we’re introducing a release and promote solution. With JFROG’s platform organizations can drive a full secure, tracable, immutable and extendable release while applying the necessery gates to ensure risk free release processes.
Session
There are a number of metrics that can be used to get a better understanding of the vulnerabilities that may be present in software. There is the Common Weakness Scoring System (CWSS), the Exploitability Index (EI), and the National Vulnerability Database (NVD) which includes the Common Vulnerability Enumeration (CVE). With all of the metrics how do you determine what vulnerabilities exist in your software?
In this session, we will explain some of the most used metrics in security and walk through real-world CVE examples, highlighting instances and entire categories where CVSSv3.1 falls short of providing an accurate score, both due to its design and its various flaws. The session will also cover specific indicators in the CVE description that can increase the confidence in a CVSS rating, and vice versa.
Session
A FREE training of best practices and hands-on workshop to enhance your DevOps and DevSecOps knowledge. Learn how to mitigate risks and exposures in your software supply chain! Attacks on the open-source supply chain are becoming more sophisticated and software developers are becoming the main target of these attacks.
This FREE hands-on training covers how JFrog platform helps Organizations to make it possible to develop and deploy artifacts across multiple geographical locations (multi-sites).
Session
The world is abuzz with “shifting left” to bring security processes earlier in the cycle for development teams. But what about the code, packages and components developers bring into an organization before they even touch the keyboard to create their software? No, this isn’t a session about how OSS is too risky to use. Join JFrog to see how the concept of software curation is gaining steam across the enterprise, and how developers can embrace the packages and libraries they need to use to move fast, all while keeping the security boogeymen at bay with the just-right amount of automated governance.
Session
Training
JFrog training of best practices and hands-on workshop to enhance your DevOps and DevSecOps knowledge. Learn how to mitigate risks and exposures in your software supply chain! Attacks on the open-source supply chain are becoming more sophisticated and software developers are becoming the main target of these attacks
Key takeaways:- Best practices for mitigating risks and exposures from the DevOps and Developer perspective
- How to apply security policies and gated functions on your software supply chain
- Hands-on experience: Vulnerability Discovery Challenge for DevOp
Learn to scale your JFrog Platform across multiple geographical development and deployment sites with consistent data and access synchronization, and modern release management process.
Key takeaways:
- How multi-site teams can distribute the required first and/or third party binaries between different sites, how to access control across multi-sites can be managed seamlessly, and how concurrent development is possible at multi-sites.
- How to apply security policies and gated functions on your software supply chain.
- Discuss how the JFrog Platform can help businesses with disaster recovery (DR) setup and readiness options, which is important for business continuity.