{"id":30512,"date":"2017-05-15T10:00:39","date_gmt":"2017-05-15T17:00:39","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=30512"},"modified":"2017-11-17T07:20:36","modified_gmt":"2017-11-17T15:20:36","slug":"ignite-2017-open-seats-compliance-best-practices-devops","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-compliance-best-practices-devops\/","title":{"rendered":"Ignite 2017 Open Seats: Compliance Best Practices for DevOps"},"content":{"rendered":"<p>Ignite \u201917 Security Conference is right around the corner. To get you ready for the premier security conference of the year, we\u2019ll be spotlighting our top session each day on the blog. <a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\">Register now<\/a>, seats fill up quickly!<\/p>\n<p>In certain highly regulated industries, such as healthcare and finance, CISOs can often view the rapid pace of change and relative independence associated with DevOps as a compliance risk. At the same time, DevOps teams view compliance as a hindrance to agility and innovation.<\/p>\n<p>However, when done properly, DevOps can actually ensure and strengthen compliance by incorporating automated policy enforcement into the development process. Building in orchestration and automation tools into the DevOps process saves a lot of headaches, human errors and misconfigurations. If DevOps organizations had the ability to test an application\u2019s security policy compliance, similar to any other piece of code in development, through an automated workflow, software could be modified at the first signs of security risks and vulnerabilities.<\/p>\n<p>In this session, CISOs will learn the many benefits behind automating the DevOps process for security compliance, including:<\/p>\n<ul>\n<li>How to bring order to a \u201cwild wild west\u201d landscape where anyone has access to production systems and data<\/li>\n<li>Closing the lid on security skills gap by enabling DevOps teams to audit new solutions and applications<\/li>\n<li>Eliminating wasted time and the potential for human error from manual tasks<\/li>\n<li>Reducing amount of data breaches and security risks<\/li>\n<li>Enabling continuous compliance for companies facing PCI DSS, HIPAA, and additional regulations<\/li>\n<\/ul>\n<hr \/>\n<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\"><span class=\"s2\"><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><b>Register for Ignite \u201917 Security Conference <\/b><\/a><br \/>\n<i>Vancouver, BC June 12\u201315, 2017<\/i><\/span><\/div>\n<p class=\"p2\"><span class=\"s2\">Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" ><span class=\"s3\">Ignite website<\/span><\/a> for more information on tracks, workshops and marquee sessions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To get you ready for the premier security conference of the year, we\u2019ll be spotlighting our top session each day on the blog.<\/p>\n","protected":false},"author":156,"featured_media":23630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,99],"tags":[1665,1869],"coauthors":[1546],"class_list":["post-30512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","category-ignite","tag-devops","tag-ignite-2017"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/01\/ignite-17-banner-600x200-2.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/30512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=30512"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/30512\/revisions"}],"predecessor-version":[{"id":50358,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/30512\/revisions\/50358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/23630"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=30512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=30512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=30512"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=30512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}