{"id":21120,"date":"2019-03-04T08:56:19","date_gmt":"2019-03-04T14:56:19","guid":{"rendered":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/"},"modified":"2019-03-04T08:56:19","modified_gmt":"2019-03-04T14:56:19","slug":"how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration","status":"publish","type":"post","link":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/","title":{"rendered":"How to be successful with your DevSecOps transformation with Value Stream Integration"},"content":{"rendered":"<figure>\n<div class=\"feature-image\"><img decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png\" alt=\"How to be successful with your DevSecOps transformation with Value Stream Integration\"><\/div>\n<\/figure>\n<blockquote>\n<p><b>&#x201C;<\/b><span style=\"font-weight: 400\">Cybersecurity is a software &#x201C;arms race&#x201D; between companies managing IT and software infrastructures that protect sensitive data and bad actors who create infrastructure and software to break through those protections.&#x201D; &#x2013; <\/span><b><em>Dr. Mik Kersten<\/em>, <\/b><b>Project to Product: How To Survive and Thrive in Age of Digital Disruption with the Flow Framework<i>&#x2122;<\/i><\/b><\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us19\"><span style=\"font-weight: 400\">The RSA Conference<\/span><\/a><span style=\"font-weight: 400\"> (March 4-8, 2019) kicks off today in San Francisco, serving as a timely and important reminder of the criticality of securely building products in an increasingly unsafe digital world. With DevOps security becoming a bigger and bigger topic by the day, the practice even has its own acronym and parallel show, <\/span><a href=\"https:\/\/www.devsecopsdays.com\/2019-devsecopsdays-sanfrancisco\"><span style=\"font-weight: 400\">DevOps Connect: DevSecOps Day<\/span><\/a><span style=\"font-weight: 400\"> (March 4, 2019). <\/span><\/p>\n<p><span style=\"font-weight: 400\">With security breaches on the rise, <\/span><a href=\"https:\/\/www.google.com\/search?q=security+breaches+on+rise&amp;oq=security+breaches+on+rise&amp;aqs=chrome..69i57j0.4801j0j7&amp;sourceid=chrome&amp;ie=UTF-8\"><span style=\"font-weight: 400\">up 75 percent in just two years<\/span><\/a><span style=\"font-weight: 400\">, enterprises must look to bring security activities closer to the ideation and creation stages of the software delivery value stream if they&#x2019;re to avoid the fate of Equifax and the like. As Robin Yeman of Lockheed Martin drummed home <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=Wm9UkiQT2JE\"><span style=\"font-weight: 400\">during her session at Tasktop Connect 2018<\/span><\/a><span style=\"font-weight: 400\">, &#x201C;security used to be out of the equation [in software delivery], now it must be part of the product lifecycle.&#x201D; <\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#Home_truths_from_the_Equifax_scandal\" >Home truths from the Equifax scandal<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#Mitigating_risk_and_security_in_the_value_stream_through_integration\" >Mitigating risk and security in the value stream through integration<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Home_truths_from_the_Equifax_scandal\"><\/span><b>Home truths from the Equifax scandal<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400\">2017 was more than a simple &#x201C;wake-up call&#x201D; about digital security in the Age of Software &#x2013; it was a wrecking ball through the windows of every business leader worldwide. Nobody wants to lose their job and <\/span><a href=\"https:\/\/www.wired.com\/story\/equifax-ceo-congress-testimony\/\"><span style=\"font-weight: 400\">end up being schooled in Congress like former Equifax CEO, Richard Smith<\/span><\/a><span style=\"font-weight: 400\"> &#x2013; <\/span><i><span style=\"font-weight: 400\">especially<\/span><\/i><span style=\"font-weight: 400\"> for something they typically seem to consider to be &#x201C;an IT problem&#x201D; (Smith blamed the whole mess on a single software developer). <\/span><\/p>\n<p><span style=\"font-weight: 400\">It is this breach-related story alongside many others &#x2013; vulnerabilities at Home Depot, Target, JP Morgan Chase etc. have led to hundreds of millions of accounts being hacked &#x2013; that cuts to the very heart of the issue. The business wants to digitally transform to ensure their survival, but as Dr. Mik Kersten laments in a <\/span><a href=\"https:\/\/www.devopsdigest.com\/17-tech-leadership-lessons-learned-from-equifax-breach-1\"><span style=\"font-weight: 400\">DevOps Digest podcast<\/span><\/a><span style=\"font-weight: 400\">, &#x201C;leaders of these companies are not understanding that they have an organizational responsibility to managing their IT stack. That stack is how they&#x2019;re delivering value to their customers and how they&#x2019;re exposing their customers&#x2019; data or safety.&#x201D;<\/span><\/p>\n<p><span style=\"font-weight: 400\">The cold hard truth is that IT security is neither a business or IT leader responsibility, it&#x2019;s an <\/span><i><span style=\"font-weight: 400\">organizational <\/span><\/i><span style=\"font-weight: 400\">responsibility. As John Esser, Senior Director of IT and Data Center Operations at <a href=\"https:\/\/www.advancedmd.com\/\">AdvancedMD<\/a> emphasizes in the same podcast, it &#x201C;<\/span><span style=\"font-weight: 400\">was truly an organizational failure all the way up and all the way down. Any security auditor would pick up on these things in a basic audit &#x2013; how long was some auditor saying, &#x2018;We have a problem&#x2019;?&#x201D;<\/span><\/p>\n<p><span style=\"font-weight: 400\">What&#x2019;s more, this risk &#x2013; alongside critical defects &#x2013; are items that can be easily managed within the production system as long as they&#x2019;re prioritized alongside new features and technical debt (as explained in Mik Kersten&#x2019;s book <\/span><a href=\"http:\/\/projecttoproduct.org\/\"><i><span style=\"font-weight: 400\">Project to Product<\/span><\/i> <\/a><span style=\"font-weight: 400\">and the pioneering <\/span><a href=\"https:\/\/flowframework.org\/\"><span style=\"font-weight: 400\">Flow Framework&#x2122;<\/span><\/a><span style=\"font-weight: 400\">). <\/span><\/p>\n<p><span style=\"font-weight: 400\">Given the dire consequences that we&#x2019;ve seen, risk and security must not be compromised in favor of speed-to-market and\/or sparkling new features. It doesn&#x2019;t matter how great a product is, or that you&#x2019;re the first to release a new feature, if it leaks customer data like a sieve. By treating risk items as a major component of a product value stream, business leadership can safeguard their business and innovate more safely.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Mitigating_risk_and_security_in_the_value_stream_through_integration\"><\/span><b>Mitigating risk and security in the value stream through integration<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400\">A key part of managing security risk and defects is being able to see them; you can&#x2019;t fix what you can&#x2019;t see (at least not until it&#x2019;s too late). And that&#x2019;s not easy to do in enterprise software. The bigger the application, the larger its attack surface. Auditing has never seemed so much like building a house of cards in the wind.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As systems scale to serve more customers and cloud adoption continues to drive everything online, it can often feel like trying to spot an assassin in a sea of people. But what if we could put a bright pink hat on them to follow them through the crowd? Well, Value Stream Integration does just that. By connecting all tools involved in the planning, building and delivering of software &#x2013; <\/span><a href=\"\/whitehat\"><span style=\"font-weight: 400\">including Application Security tools like our close partner WhiteHat <\/span><\/a><span style=\"font-weight: 400\">(Booth 1459, RSA) &#x2013; we make invisible knowledge work (and dangerous byproducts) visible and easier to address.<\/span><\/p>\n<p><span style=\"font-weight: 400\">By integrating Agile Planning tools with WhiteHat and other tools in the value stream, everyone has real-time visibility into red flag issues as they arise. Faster detection, faster resolution without all that slow, cumbersome and error-prone manual work through spreadsheets, tool-switching, email threads and so on. Given what happened at Equifax, do you really want to test fate with such a porous, quicksand approach? Automation through <\/span><a href=\"\/integration-hub\"><span style=\"font-weight: 400\">Value Stream Integration<\/span><\/a><span style=\"font-weight: 400\"> is a godsend in that respect.<\/span><\/p>\n<p style=\"text-align: center\">\n<p style=\"text-align: left\"><a href=\"\/contact-us\"><span style=\"font-weight: 400\">Contact us today<\/span><\/a><span style=\"font-weight: 400\"> for more information on integrating WhiteHat and other tools to the rest of your value stream with Tasktop. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#x201C;Cybersecurity is a software &#x201C;arms race&#x201D; between companies managing IT and software infrastructures that protect sensitive data and bad actors who create infrastructure and software to break through those protections.&#x201D; &#x2013; Dr. Mik Kersten, Project to Product: How To Survive and Thrive in Age of Digital Disruption with the Flow Framework&#x2122; The RSA Conference (March&#8230;<\/p>\n","protected":false},"author":226,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"categories":[9547,478,9543],"tags":[],"class_list":["post-21120","post","type-post","status-publish","format-standard","hentry","category-devops-teams","category-products","category-value-stream-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to be successful with your DevSecOps transformation with Value Stream Integration | Tasktop Blog<\/title>\n<meta name=\"description\" content=\"Enterprises must look to bring security activities closer to the ideation and creation stages of the software delivery value stream to innovate safely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to be successful with your DevSecOps transformation with Value Stream Integration\" \/>\n<meta property=\"og:description\" content=\"Enterprises must look to bring security activities closer to the ideation and creation stages of the software delivery value stream to innovate safely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/\" \/>\n<meta property=\"og:site_name\" content=\"Planview Blog\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-04T14:56:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png\" \/>\n<meta name=\"author\" content=\"Patrick Anderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Planview\" \/>\n<meta name=\"twitter:site\" content=\"@Planview\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Anderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/\"},\"author\":{\"name\":\"Patrick Anderson\",\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/person\/0a937ebcbb167df16ae058729e3a8843\"},\"headline\":\"How to be successful with your DevSecOps transformation with Value Stream Integration\",\"datePublished\":\"2019-03-04T14:56:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/\"},\"wordCount\":889,\"publisher\":{\"@id\":\"https:\/\/blog.planview.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png\",\"articleSection\":[\"DevOps Teams\",\"Products &amp; Tools\",\"Value Stream Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/\",\"url\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/\",\"name\":\"How to be successful with your DevSecOps transformation with Value Stream Integration | Tasktop Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.planview.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png\",\"datePublished\":\"2019-03-04T14:56:19+00:00\",\"description\":\"Enterprises must look to bring security activities closer to the ideation and creation stages of the software delivery value stream to innovate safely.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage\",\"url\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png\",\"contentUrl\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.planview.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to be successful with your DevSecOps transformation with Value Stream Integration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.planview.com\/#website\",\"url\":\"https:\/\/blog.planview.com\/\",\"name\":\"Planview Blog\",\"description\":\"Leading the conversation on digital connected work\",\"publisher\":{\"@id\":\"https:\/\/blog.planview.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.planview.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.planview.com\/#organization\",\"name\":\"Planview\",\"url\":\"https:\/\/blog.planview.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png\",\"contentUrl\":\"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png\",\"width\":280,\"height\":66,\"caption\":\"Planview\"},\"image\":{\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772\",\"https:\/\/x.com\/Planview\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/person\/0a937ebcbb167df16ae058729e3a8843\",\"name\":\"Patrick Anderson\",\"description\":\"Patrick is Senior Content Manager at Tasktop and oversees the company's content and thought leadership programs. Outside the office, you\u2019ll find him reading, writing, slapping some bass (poorly), rambling in nature and following his English football (soccer) team, West Ham United.\",\"url\":\"https:\/\/blog.planview.com\/author\/patrick-anderson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to be successful with your DevSecOps transformation with Value Stream Integration | Tasktop Blog","description":"Enterprises must look to bring security activities closer to the ideation and creation stages of the software delivery value stream to innovate safely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/","og_locale":"en_US","og_type":"article","og_title":"How to be successful with your DevSecOps transformation with Value Stream Integration","og_description":"Enterprises must look to bring security activities closer to the ideation and creation stages of the software delivery value stream to innovate safely.","og_url":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/","og_site_name":"Planview Blog","article_publisher":"http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772","article_published_time":"2019-03-04T14:56:19+00:00","og_image":[{"url":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png","type":"","width":"","height":""}],"author":"Patrick Anderson","twitter_card":"summary_large_image","twitter_creator":"@Planview","twitter_site":"@Planview","twitter_misc":{"Written by":"Patrick Anderson","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#article","isPartOf":{"@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/"},"author":{"name":"Patrick Anderson","@id":"https:\/\/blog.planview.com\/#\/schema\/person\/0a937ebcbb167df16ae058729e3a8843"},"headline":"How to be successful with your DevSecOps transformation with Value Stream Integration","datePublished":"2019-03-04T14:56:19+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/"},"wordCount":889,"publisher":{"@id":"https:\/\/blog.planview.com\/#organization"},"image":{"@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png","articleSection":["DevOps Teams","Products &amp; Tools","Value Stream Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/","url":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/","name":"How to be successful with your DevSecOps transformation with Value Stream Integration | Tasktop Blog","isPartOf":{"@id":"https:\/\/blog.planview.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage"},"image":{"@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png","datePublished":"2019-03-04T14:56:19+00:00","description":"Enterprises must look to bring security activities closer to the ideation and creation stages of the software delivery value stream to innovate safely.","breadcrumb":{"@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#primaryimage","url":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png","contentUrl":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/03\/tasktop-devsecops-whitehat-850x550.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.planview.com\/how-to-be-successful-with-your-devsecops-transformation-with-value-stream-integration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.planview.com\/"},{"@type":"ListItem","position":2,"name":"How to be successful with your DevSecOps transformation with Value Stream Integration"}]},{"@type":"WebSite","@id":"https:\/\/blog.planview.com\/#website","url":"https:\/\/blog.planview.com\/","name":"Planview Blog","description":"Leading the conversation on digital connected work","publisher":{"@id":"https:\/\/blog.planview.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.planview.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.planview.com\/#organization","name":"Planview","url":"https:\/\/blog.planview.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png","contentUrl":"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png","width":280,"height":66,"caption":"Planview"},"image":{"@id":"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772","https:\/\/x.com\/Planview"]},{"@type":"Person","@id":"https:\/\/blog.planview.com\/#\/schema\/person\/0a937ebcbb167df16ae058729e3a8843","name":"Patrick Anderson","description":"Patrick is Senior Content Manager at Tasktop and oversees the company's content and thought leadership programs. Outside the office, you\u2019ll find him reading, writing, slapping some bass (poorly), rambling in nature and following his English football (soccer) team, West Ham United.","url":"https:\/\/blog.planview.com\/author\/patrick-anderson\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/posts\/21120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/comments?post=21120"}],"version-history":[{"count":0,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/posts\/21120\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/media?parent=21120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/categories?post=21120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/tags?post=21120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}