Chromebooks and Network Motes: Enforcing Security Posture from Device to Cloud
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore a comprehensive security strategy using Chromebooks and network motes to enforce security posture from device to cloud in this 31-minute OWASP Foundation talk. Discover how to balance developer productivity with robust security measures, addressing the challenges of providing secure access to high-stakes production environments while granting admin rights on personal devices. Learn from the speaker's experience in implementing Chromebooks as a solution, including the technical hurdles encountered and overcome. Gain insights into protecting against malware, phishing, and credential theft while establishing secure zones and implementing a two-laptop approach. Understand the practical implications of this security model and the valuable lessons learned throughout the implementation process.
Syllabus
Intro
The Attacks
Dedicated Secure Device
Better security is possible
Outline
Scorecard
Malware
Phishing
Credential Theft
Secure Zone
Put it all together
Setup Step 1
Setup Step 2
Setup Step 3
How does Two Laptops Work in Practice?
Lessons
The End
Taught by
OWASP Foundation
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity