Application Security at DevOps Speed and Portfolio Scale
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore a revolutionary approach to application security in this 52-minute conference talk from OWASP Foundation. Learn how to bridge the gap between modern software development practices and outdated security techniques. Discover the concept of instrumenting IT organizations with passive sensors to collect real-time data for identifying vulnerabilities, enhancing security architecture, and generating value. Gain insights into achieving unprecedented visibility into application security across an entire organization's portfolio, enabling proactive collaboration among security stakeholders. Examine topics such as healthcare-inspired security approaches, sensor design for clickjacking detection, continuous AppSec dashboards, and various security sensors for access control, vulnerable libraries, CSRF defense, and injection prevention. Understand how to align security measures with business concerns and transform application security to keep pace with DevOps speed and portfolio scale.
Syllabus
Intro
Application Security Is Healthcare
Sensors Are Revolutionizing Healthcare Your phone will know you're sick before you
Modern Software Development...
Defining "Portfolio Scale"
Gathering Intelligence
Designing a Clickjacking Sensor
Instrumentation
CHECK YOUR HEADERS
Continuous AppSec Dashboard
Access Control Intelligence Sensor
Generated Access Control Matrix from Code
Known Vulnerable Libraries Sensor
CSRF Defense Sensor
Canonicalization Correctness Sensor
Injection Sensors
Aligning Sensors with Business Concerns
Continuous Application Security!
Transforming AppSec
Taught by
OWASP Foundation
Related Courses
Cyber Security in ManufacturingUniversity at Buffalo via Coursera Microsoft Azure DevOps Engineer: Recommend and Design System Feedback Mechanisms
Pluralsight Security Event Triage: Operationalizing Security Analysis
Pluralsight Utilizing Zeek in an Enterprise Environment or for Distributed Operations
Pluralsight Enterprise Security
Udacity