YoVDO

Supply Chain Unchained - How To Be A Bad SaaS

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Software as a Service (SaaS) Courses Access Control Courses Cloud Security Courses Supply Chain Security Courses

Course Description

Overview

Explore a comprehensive analysis of supply chain security in SaaS environments through this 25-minute conference talk delivered at the 44CON Information Security Conference. Delve into the distinctions between flaws and bugs, examine rollbase access control, and investigate API restrictions. Gain insights into maturity evaluation processes, the importance of logging, cloud security considerations, and code integrity measures. Learn from April C. Wright, a seasoned hacker and security expert with over 25 years of experience, as she shares valuable knowledge on safeguarding critical communications and connections in the digital landscape.

Syllabus

Intro
Flaw vs Bug
Rollbase Access Control
API Restrictions
maturity evaluation
logs
cloud
code integrity


Taught by

44CON Information Security Conference

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary