YoVDO

Supply Chain Unchained - How To Be A Bad SaaS

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Software as a Service (SaaS) Courses Access Control Courses Cloud Security Courses Supply Chain Security Courses

Course Description

Overview

Explore a comprehensive analysis of supply chain security in SaaS environments through this 25-minute conference talk delivered at the 44CON Information Security Conference. Delve into the distinctions between flaws and bugs, examine rollbase access control, and investigate API restrictions. Gain insights into maturity evaluation processes, the importance of logging, cloud security considerations, and code integrity measures. Learn from April C. Wright, a seasoned hacker and security expert with over 25 years of experience, as she shares valuable knowledge on safeguarding critical communications and connections in the digital landscape.

Syllabus

Intro
Flaw vs Bug
Rollbase Access Control
API Restrictions
maturity evaluation
logs
cloud
code integrity


Taught by

44CON Information Security Conference

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera