Gene Kim
Founder & CTO, Tripwire
Gene Kim
Founder & CTO, Tripwire
Biography
Gene Kim has been studying high performing technology organizations since 1999. He was founder and CTO of Tripwire, Inc for 13 years, an enterprise security software company.
His books have sold over 1 million copies — he is author of the WSJ bestselling book The Unicorn Project, and was co-author of The Phoenix Project, The DevOps Handbook, and the Shingo Publication Award winning Accelerate.
Since 2014, he has been the organizer of the DevOps Enterprise Summit, studying the technology transformations of large, complex organizations.
Speaker Videos
Gene Kim Demo
Speech Topics
The Unicorn Project: Developers, Digital Disruption & Thriving in the Age of Data
The Age of Software is here, and another mass extinction event looms. In this keynote, Kim shares the stories about rebel developers and business leaders working together, racing against time to innovate, survive, and thrive in a time of unprecedented uncertainty and opportunity. The Unicorn Project helps technological companies improve their business through the perspective of software development.
Why Everyone Needs DevOps Now: A Fifteen Year Studying High Performing Organizations
More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater. This speech shows leaders how to replicate these incredible outcomes through integrating Product Management, Development, QA, IT Operations, and Information Security to elevate and win in the marketplace.
Testimonials
Books & Media
Books
The Unicorn Project: A Novel about Developers, Digital Disruption, and Thriving in the Age of Data
The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win
The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps
Beyond the Phoenix Project: The Origins and Evolution of DevOps
Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps