Third-Party Integrations: Friend or Foe? - Security Risks and Solutions
Offered By: USENIX Enigma Conference via YouTube
Course Description
Overview
Explore the challenges and solutions surrounding third-party integrations in microservice architectures during this 19-minute conference talk from USENIX Enigma 2020. Delve into typical integration flows, identify security visibility gaps, and learn about effective risk analysis strategies for organizations dealing with numerous external services. Discover how improving these processes can lead to a more comprehensive and consistent risk map of organizational assets. Gain insights into deriving new metrics and incident response systems from seemingly mundane security work, emphasizing the importance of thorough risk assessment in the face of increasing reliance on third-party services.
Syllabus
Intro
Who am I
The Incident
The Red Team
Target Example
Procurement Example
Un unfettered outbound access
Lack of vendor context
Conclusion
Taught by
USENIX Enigma Conference
Related Courses
Information Security Management in a NutshellSAP Learning Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Enterprise Security Fundamentals
Microsoft via edX Planning a Security Incident Response
Microsoft via edX Introduction to Cybersecurity
Udacity