IN-PERSON EVENT

DevOps and DevSecOps
User Conference

November 15th
| Hotel InterContinental London Park Lane

Join us at
JFrog’s DevSecOps Day EMEA

DevOps and DevSecOps teams are required to stay ahead and be prepared for the unexpected challenges coming their way.
With in-person keynotes, breakout sessions, technical workshops and networking with other industry professionals you will gain the practical knowledge and insights you need to be prepared for 2024 challenges.

The event is FREE OF CHARGE.

Please RSVP by filling out the form. The number of seats are limited, so hurry up to confirm your spot!

Who Should Attend DevSecOps Day EMEA?

Anyone who is a Developer, DevOps Engineer, Security Professional or a DevOps / IT Leader who is interested in DevOps or DevSecOps. This is a full day event for customers and prospects that demonstrates  all use cases and challenges that JFrog can enable you to solve.

Event Will Start in

Days
Hours
Minutes
Seconds

speakers

Asaf Karas

CTO, SVP
Security

YOSSI SHAUL

SVP
JFrog DevOps

Eyal Rudnik

SVP
EMEA Sales

Shachar Menashe

Director of Threat Research

Or Yaacov

VP of SolutionS
Engineering

Our Plan For The Event

9:00 AM
9:45 AM

Keynote

The evolution from DevOps and CI/CD to cloud-native technologies, microservices architecture, security and governance – and now all the way to automation and Artificial Intelligence – requires a new generation of SSC management that aims to deliver software faster, with higher quality, enhanced security, and improved customer experiences. In this session, we’ll share insights from over 7,000 JFrog customers, and what the F100 list tells us about where the software supply chain is headed. Get Ready for Next!

10:00 AM

Keynote

Managing and securing the software supply chain end-to-end is one of the most difficult challenges facing DevOps and DevSecOps teams today. As developers continue to push all boundaries on the left and right side of the software release cycle, enterprise focus remains on binaries, and their movement through the pipeline automatically and securely. See how an integrated, consistent platform approach is the only way to solve next-gen supply chain challenges!

10:30 AM

Developers are now the target of the attacker, with binaries available publicly. While it’s unlikely that the concept of security point solutions will completely disappear, it’s clear that the market is demanding a consolidated, comprehensive approach to pipeline security across the attack surface. With the increasing complexity of software supply chains, security and governance are becoming critical on developer’s machines, at the C-level and in boardrooms. Next-gen software supply chain solutions must incorporate robust, holistic security or risk being the next tool to be consolidated. See brand-new demonstrations of the DevOps-centric approach to security that will drive the pipelines of tomorrow.

Keynote

11:00 AM
12:30 PM
1:30 PM

There are a number of metrics that can be used to get a better understanding of the vulnerabilities that may be present in software. There is the Common Weakness Scoring System (CWSS), the Exploitability Index (EI), and the National Vulnerability Database (NVD) which includes the Common Vulnerability Enumeration (CVE). With all of the metrics how do you determine what vulnerabilities exist in your software?
In this session, we will explain some of the most used metrics in security and walk through real-world CVE examples, highlighting instances and entire categories where CVSSv3.1 falls short of providing an accurate score, both due to its design and its various flaws. The session will also cover specific indicators in the CVE description that can increase the confidence in a CVSS rating, and vice versa.

Session

A FREE training of best practices and hands-on workshop to enhance your DevOps and DevSecOps knowledge. Learn how to mitigate risks and exposures in your software supply chain! Attacks on the open-source supply chain are becoming more sophisticated and software developers are becoming the main target of these attacks.

This FREE hands-on training covers how JFrog platform helps Organizations to make it possible to develop and deploy artifacts across multiple geographical locations (multi-sites).

2:10 PM

As part of the growing demand for end-to-end software supply chain solutions, we’re introducing a release and promote solution. With JFROG’s platform organizations can drive a full secure, tracable, immutable and extendable release while applying the necessery gates to ensure risk free release processes.

Session

2:40 PM
3:00 PM

There are a number of metrics that can be used to get a better understanding of the vulnerabilities that may be present in software. There is the Common Weakness Scoring System (CWSS), the Exploitability Index (EI), and the National Vulnerability Database (NVD) which includes the Common Vulnerability Enumeration (CVE). With all of the metrics how do you determine what vulnerabilities exist in your software?

In this session, we will explain some of the most used metrics in security and walk through real-world CVE examples, highlighting instances and entire categories where CVSSv3.1 falls short of providing an accurate score, both due to its design and its various flaws. The session will also cover specific indicators in the CVE description that can increase the confidence in a CVSS rating, and vice versa.

Session

A FREE training of best practices and hands-on workshop to enhance your DevOps and DevSecOps knowledge. Learn how to mitigate risks and exposures in your software supply chain! Attacks on the open-source supply chain are becoming more sophisticated and software developers are becoming the main target of these attacks.

This FREE hands-on training covers how JFrog platform helps Organizations to make it possible to develop and deploy artifacts across multiple geographical locations (multi-sites).

3:30 PM
4:10 PM

The world is abuzz with “shifting left” to bring security processes earlier in the cycle for development teams. But what about the code, packages and components developers bring into an organization before they even touch the keyboard to create their software? No, this isn’t a session about how OSS is too risky to use. Join JFrog to see how the concept of software curation is gaining steam across the enterprise, and how developers can embrace the packages and libraries they need to use to move fast, all while keeping the security boogeymen at bay with the just-right amount of automated governance.

Session

Training

Whether you’re just starting out, have some experience, or are an advanced user of JFrog products, our training program offers the opportunity to enhance your understanding of JFrog Artifactory, Security, and other key aspects. Our expert instructors will guide you in elevating your organization’s software supply chain to new heights.
Roy Ben Shoushan | Solution Engineering Manager, JFrog
Rami Zilberstein | Director of Excellence, JFrog

JFrog training of best practices and hands-on workshop to enhance your DevOps and DevSecOps knowledge. Learn how to mitigate risks and exposures in your software supply chain! Attacks on the open-source supply chain are becoming more sophisticated and software developers are becoming the main target of these attacks

Key takeaways:
  • Best practices for mitigating risks and exposures from the DevOps and Developer perspective
  • How to apply security policies and gated functions on your software supply chain
  • Hands-on experience: Vulnerability Discovery Challenge for DevOp
David Robin | Sr. Solutions Engineer, Engineering Manager, JFrog
Danny Parizada | Solution Engineer, JFrog

Learn to scale your JFrog Platform across multiple geographical development and deployment sites with consistent data and access synchronization, and modern release management process. 

Key takeaways:

  • How multi-site teams can distribute the required first and/or third party binaries between different sites, how to access control across multi-sites can be managed seamlessly, and how concurrent development is possible at multi-sites.
  • How to apply security policies and gated functions on your software supply chain.
  • Discuss how the JFrog Platform can help businesses with disaster recovery (DR) setup and readiness options, which is important for business continuity.
Scroll to Top

Thank you for registering for:
JFrog DevSecOpsDay EMEA 2023 Conference

Your registration is under review and depending on availability we will confirm your seat. Once we reserve a seat, you will receive an email with confirmation and the details of the event.

THANK YOU!​

Thank you for your interest in swampUP 2024. We’ll be in touch shortly!

Thanks for signing up for a Private Security Workshop!

We can’t wait to see you...

Thanks for signing up to the DevSecOps Hangout!

We can’t wait to see you virtually on July 26 at 10AM CET for our LIVE Lightning sessions for DevOps and DevSecOps.

Please note that you will receive a Zoom link to your email shortly. Please save it.