THREAT CON 2019 - Securing the SDLC in the real world by Jim Manico
Talk Title: Securing the SDLC in the real world
Presenter: Jim Manico
The earlier you address security in the engineering of software, the less expensive it will be for your organization. There are many who will tell you that you need to change all of your current processes around building software so it is more secure. Many of those forces are consultants charging high rates to help you deeply modify what you are doing today. This talk will take the opposite approach. How can you add a few reasonable and mostly lightweight processes to how you build software today to make it more secure? Software development is like driving a boat. You need to look ahead make small changes to steer effectively.
Website : http://threatcon.io
Twitter : https://twitter.com/threat_con
Facebook : https://www.facebook.com/threatcon
Видео THREAT CON 2019 - Securing the SDLC in the real world by Jim Manico канала THREAT CON
Presenter: Jim Manico
The earlier you address security in the engineering of software, the less expensive it will be for your organization. There are many who will tell you that you need to change all of your current processes around building software so it is more secure. Many of those forces are consultants charging high rates to help you deeply modify what you are doing today. This talk will take the opposite approach. How can you add a few reasonable and mostly lightweight processes to how you build software today to make it more secure? Software development is like driving a boat. You need to look ahead make small changes to steer effectively.
Website : http://threatcon.io
Twitter : https://twitter.com/threat_con
Facebook : https://www.facebook.com/threatcon
Видео THREAT CON 2019 - Securing the SDLC in the real world by Jim Manico канала THREAT CON
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![THREAT CON 2019 - Hacking Human Lives via Body Area Network by Vignesh C](https://i.ytimg.com/vi/9OU8LiNyTAs/default.jpg)
![THREAT CON 2022- Attacking Access Control Models in Modern Web Applications By Imran Parray](https://i.ytimg.com/vi/ROySlONiZzM/default.jpg)
![THREAT CON 2019 - Depth of effective macro campaign by Aniruddha Dolas and Prashant Tilekar](https://i.ytimg.com/vi/zxBpqzAYYyE/default.jpg)
![Threat CON 2018 - Exploiting Cloud Synchronisation to Mass Hack IoTs](https://i.ytimg.com/vi/oc40vThlXNM/default.jpg)
![THREAT CON 2022- Automation for Manual Bug Bounty Hunters By Eugene Lim (spaceraccoonsec)](https://i.ytimg.com/vi/DlTWet7JcKk/default.jpg)
![THREAT CON 2019 - Nepal’s level of preparedness to deal with cyberwarfare attacks by Yogesh Ojha](https://i.ytimg.com/vi/6cKWEfqij5Y/default.jpg)
![THREAT CON 2022- XSS Curioxssity by Ahmad Ashraff](https://i.ytimg.com/vi/XMew1t8VIcY/default.jpg)
![Threat CON 2018 - Building and Developing Communities (keynote) by Matt Suiche](https://i.ytimg.com/vi/kdtFl3XQv2Y/default.jpg)
![Day 2 - THREAT CON 2021 | Virtual Edition](https://i.ytimg.com/vi/J-kH_t4rFos/default.jpg)
![THREAT CON 2022 - Gajabaar, An InfoSecurity Mentorship – Design To Deployment by Prasant Adhikari](https://i.ytimg.com/vi/LF10yA3GPJ0/default.jpg)
![Threat CON 2018 - License managers: The Phantom Menace](https://i.ytimg.com/vi/F7N3ZGvpRFI/default.jpg)
![THREAT CON 2019 - Bypassing iOS Security by Georgia Weidman](https://i.ytimg.com/vi/1pxZj-Zyzbg/default.jpg)
![THREAT CON 2019 - XSS is dead?(Keynote) by Mario Heiderich](https://i.ytimg.com/vi/qEzBnzhluHY/default.jpg)
![Threat CON 2018 - How To Effectively Manage Your Org's Cloud Security Posture](https://i.ytimg.com/vi/w0d1qXWUXvA/default.jpg)
![THREAT CON 2022 - Attacking Java For Fun and Profit By Vladimir Dashchenko](https://i.ytimg.com/vi/svB4M94L3B4/default.jpg)
![Threat CON 2018 - The OWASP Top Ten Proactive Controls 2018 by Jim Manico](https://i.ytimg.com/vi/GzCxp-8RK5s/default.jpg)
![Day 1 - THREAT CON 2021 | Virtual Edition](https://i.ytimg.com/vi/2tOM_ubTOBg/default.jpg)
![THREAT CON 2022 - Frida Unleashed By Bharath Kumar & Akshay Jain (Bounty Track)](https://i.ytimg.com/vi/WzJMPy_fho0/default.jpg)
![THREAT CON 2022 - Operation Earth Berberoka by Jaromir Horejsi](https://i.ytimg.com/vi/blwOZAsDrno/default.jpg)