IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • Adobe Security Champions Summit Bucharest


    Author(s): BARBU, Ionuț-Daniel
    Issue: Volume 7, Issue 1, Year 2018

    Download PDF | Views: 36

    The Security Champions Summit recently held by Adobe in Bucharest was a multi-day event with the goal of building up the skills of our current security champions and encouraging new ones to join the program. Part of the efforts during the summit were to look at ways to consolidate processes, improve visibility for the work our champions do, and to provide training sessions and activities. Additionally, the summit provided a dedicated event for champions to meet each other face-to-face, trigger new ideas by stepping out of the ‘comfort zone’ of their own product teams, and actively be involved in hands-on trainings that will help build better partnerships with engineers and managers.

    In addition to Adobe global Security Champions, site reliability engineers, computer scientists, security analysts, cloud security engineers, and security managers from various Adobe teams were present and actively participated in discussions and brainstorming sessions. These sessions covered technologies including our own recently open-sourced tools like HubbleStack and key topics such as threat intelligence, forensics, disaster recovery, and compliance. There were also exercises around log analysis and container security. The Summit brought together the voices of security from within the product teams to share Adobe and industry best practices, as well as the latest guidance on maintaining a strong security posture across all products.

    Events like these are part of Adobe’s ongoing commitment to constantly help spark new ideas that challenge the status quo and build the broadest “security aware” community we can across the company. This effort is also part of a continued evolution around “DevSecOps” processes where security is built into the DevOps process and infrastructure from the get go. Day-to-day activities by Adobe development teams not only contribute to the achievement of operational and development goals, but also keep high levels of security, data integrity and privacy, and availability. This improved set of processes are also much easier to audit and ensure adherence to established compliance controls.

    With product teams engaging with security champions and researchers as early as possible, Adobe has been able to begin shifting from reactive to proactive approaches, better integrating defensive practices throughout the product lifecycle. Activities like the Summit help to better evangelize and cement these “security first” practices to the benefit of teams across the company.


    Additional Information

    Title: Adobe Security Champions Summit Bucharest
    Author(s): BARBU, Ionuț-Daniel
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225, e-ISSN: 2286-0096
    Issue: Volume 7, Issue 1, Year 2018
    Section: Books Reviews and Conferences Analysis
    Page Range: 56



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.