YoVDO

Supply Chain Unchained - How To Be A Bad SaaS

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Software as a Service (SaaS) Courses Access Control Courses Cloud Security Courses Supply Chain Security Courses

Course Description

Overview

Explore a comprehensive analysis of supply chain security in SaaS environments through this 25-minute conference talk delivered at the 44CON Information Security Conference. Delve into the distinctions between flaws and bugs, examine rollbase access control, and investigate API restrictions. Gain insights into maturity evaluation processes, the importance of logging, cloud security considerations, and code integrity measures. Learn from April C. Wright, a seasoned hacker and security expert with over 25 years of experience, as she shares valuable knowledge on safeguarding critical communications and connections in the digital landscape.

Syllabus

Intro
Flaw vs Bug
Rollbase Access Control
API Restrictions
maturity evaluation
logs
cloud
code integrity


Taught by

44CON Information Security Conference

Related Courses

Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube
Why Security-as-a-Feature Will Never Happen
44CON Information Security Conference via YouTube