When Molehill Vulnerabilities Become Mountainous Exploits
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the dangers of overlooking medium-severity vulnerabilities in application security through a live demo and expert insights. Witness how seemingly minor security flaws can be exploited to create significant attacks, emphasizing the importance of static source code analysis in identifying vulnerabilities that penetration tests might miss. Learn to leverage static application security testing as an attack technique and understand why addressing all levels of vulnerabilities is crucial for a robust AppSec program. Gain valuable knowledge from Matt Rose, Global Director of Application Security Strategy at Checkmarx, as he shares his extensive experience in secure software development lifecycles and static analysis implementation across various industries and technical environments.
Syllabus
Introduction
What doesnt work
Initial statements
Security conscious organization
Prioritize severity
Waiting until the end
Demo
Ontime Delivery
QA
Developer Adoption
Developer Security
Questions
Taught by
OWASP Foundation
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera