YoVDO

Application Security at DevOps Speed and Portfolio Scale

Offered By: OWASP Foundation via YouTube

Tags

Application Security Courses DevOps Courses Access Control Courses Continuous Monitoring Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a revolutionary approach to application security in this 52-minute conference talk from OWASP Foundation. Learn how to bridge the gap between modern software development practices and outdated security techniques. Discover the concept of instrumenting IT organizations with passive sensors to collect real-time data for identifying vulnerabilities, enhancing security architecture, and generating value. Gain insights into achieving unprecedented visibility into application security across an entire organization's portfolio, enabling proactive collaboration among security stakeholders. Examine topics such as healthcare-inspired security approaches, sensor design for clickjacking detection, continuous AppSec dashboards, and various security sensors for access control, vulnerable libraries, CSRF defense, and injection prevention. Understand how to align security measures with business concerns and transform application security to keep pace with DevOps speed and portfolio scale.

Syllabus

Intro
Application Security Is Healthcare
Sensors Are Revolutionizing Healthcare Your phone will know you're sick before you
Modern Software Development...
Defining "Portfolio Scale"
Gathering Intelligence
Designing a Clickjacking Sensor
Instrumentation
CHECK YOUR HEADERS
Continuous AppSec Dashboard
Access Control Intelligence Sensor
Generated Access Control Matrix from Code
Known Vulnerable Libraries Sensor
CSRF Defense Sensor
Canonicalization Correctness Sensor
Injection Sensors
Aligning Sensors with Business Concerns
Continuous Application Security!
Transforming AppSec


Taught by

OWASP Foundation

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Microsoft Azure DevOps Engineer: Recommend and Design System Feedback Mechanisms
Pluralsight
Security Event Triage: Operationalizing Security Analysis
Pluralsight
Utilizing Zeek in an Enterprise Environment or for Distributed Operations
Pluralsight
Enterprise Security
Udacity