YoVDO

Supply Chain Unchained - How To Be A Bad SaaS

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Software as a Service (SaaS) Courses Access Control Courses Cloud Security Courses Supply Chain Security Courses

Course Description

Overview

Explore a comprehensive analysis of supply chain security in SaaS environments through this 25-minute conference talk delivered at the 44CON Information Security Conference. Delve into the distinctions between flaws and bugs, examine rollbase access control, and investigate API restrictions. Gain insights into maturity evaluation processes, the importance of logging, cloud security considerations, and code integrity measures. Learn from April C. Wright, a seasoned hacker and security expert with over 25 years of experience, as she shares valuable knowledge on safeguarding critical communications and connections in the digital landscape.

Syllabus

Intro
Flaw vs Bug
Rollbase Access Control
API Restrictions
maturity evaluation
logs
cloud
code integrity


Taught by

44CON Information Security Conference

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera