Главная
Study mode:
on
1
Intro
2
Layer 9 Security Controls
3
The Agenda
4
The Reality
5
Broken Security
6
The Situation
7
Example Problem
8
What We Need We need
9
The Solution: Buckets
10
Bucket: Hosting Stuff
11
Bucket: Bespoke Development
12
Bucket: COTS / SaaS
13
What Does It Mean To Be In A Bucket?
14
Example Contract Language Infrastructure
15
Guidance To Legal/Procurement
16
Example Vendor Bad Behaviour
17
Worked Example
18
We Don't Win Every Point
19
Quid Pro Quo
20
Layer 9 Attack and Defence
21
Doing It Yourself
Description:
Explore a comprehensive case study from BruCON Security Conference on integrating security, legal, and procurement teams to enhance software security. Learn how one of the UK's largest online retailers implemented contractual obligations for vendors and service providers to address vulnerabilities before software launch. Discover a three-step action plan and framework for engaging legal and procurement in the security process, resulting in more secure software and improved visibility into partner development lifecycles. Gain insights into effective security controls, contract language examples, and strategies for dealing with vendor behavior. Understand the benefits of this approach in preventing costly post-launch fixes and reducing enterprise and customer risk.

Security Model Bedfellows

BruCON Security Conference
Add to list
0:00 / 0:00