YoVDO

Digital Supply Chain Security - The Exposed Flank

Offered By: YouTube

Tags

Conference Talks Courses Fraud Prevention Courses Security Breaches Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore digital supply chain security challenges and solutions in this 44-minute conference talk from Circle City Con 2015. Delve into the complexities of global legal issues, geopolitical concerns, and human factors affecting supply chain integrity. Examine case studies on ATM fraud, intellectual property theft, and hardware trojans. Learn about ISO 28000:2007 standards and their relevance to digital security. Discover strategies for going beyond compliance, implementing defined repeatable processes, and building resilient systems. Gain insights on addressing offshore development risks, managing partner networks, and navigating the budget battle for improved security measures.

Syllabus

Intro
LEVEL SETTING
WHY I'M INTERESTED
WHAT DO I MEAN?
THE GROUND FLOOR
ISO 28000:2007
ISO 28000 HIGHLIGHTS
OUR FLANKT WHAT FLANKT THE MAGINOT LINE
CASE IN POINT...
GLOBAL LEGAL COMPLEXITY, HUMAN CHALLENGES & COMPLICATIONS
GEOPOLITICAL
LEGAL ISSUES
BLUE COAT & SYRIA
ANOTHER LEGAL ISSUE EXAMPLE, ATM FRAUD
IT WAS QUICK
THE FLOW
WHAT WENT WRONG?
INTELLECTUAL PROPERTY
SNIPS IN THE WIRE
SOURCE CODE ISSUES
PARTNER NETWORKS
WAR STORY
THE LOGINS
SPACE & TIME
THE CATCH
HARDWARE TROJANS
BATTLEFIELD ROBOTS
GO BEYOND COMPLIANCE
OFF SHORE DEVELOPMENT
HAMSTER WHEEL OF PAIN
DEFINED REPEATABLE PROCESSES
THE BUDGET BATTLE
INTERNAL APPLICATIONS
INFRASTRUCTURE DNS & WEB APPLICATIONS
BUILD TO FAIL
BAMBOO ANALOGY


Related Courses

Cybersecurity Warrior Certification: Cybersecurity Immersion
Udemy
Segurança da Informação 2023 - Proteja-se de hackers
Udemy
On the Economics of Offline Password Cracking
IEEE via YouTube
Tales from Professional Thieves
BruCON Security Conference via YouTube
Red Hat Security in a Post-Shellshock World
Red Hat via YouTube