The Tactical Application Security Program - Getting Stuff Done
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
What security team do you want to work with?
Application Security and the Bravery of Tactical Execution • Application security programs do much better tactically
Lightweight and iterative
Focus on operational excellence, less on authority Example: Measure every meaningful aspect of your assessment and incident response programs. Share those results far and wide.
A Digression on Authority & Buy-In
Assessments have a Flow
Tactical Assessment Principles
Assessment Tactics
Navigating the wilderness of existential assessment questions
Pitfalls
Critical Security Bugs 77 Critical bugs handled in the past year
Handling Outside Reports . On call pentester to handle incoming reports
Determining Scope of Impact
Bug Classifications and Why We Built It
Sample Bug Classification Table
Importance of Communication During an Incident Incident success or failure is judged by others in your company • Coordination and communication are key
Communication Email Template
Reducing the Threat Surface
Public Bug Bounties Today • Main motivations for companies to build programs
What Do These Ratios Really Mean to Me?!
Wrapping Up • Tactical approaches to application security should be • Treat your assessment program like a consultancy • Application incident response may be the most important thing to get right then consider bounty programs
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube