What's the best method to hunt adversaries and targets?
7
How do I ensure I find them all?
8
Enumerating Attack Surface
9
Mechanics of an Attack
10
Converting to Human (DevOps)
11
Can we break this down into Architectural Basics?
12
Zoning & Containment
13
Asset Management
14
Authentication (Access)
15
Encryption
16
What about Application Security?
17
What does getting ahead look like?
18
DevSecOps Maturity Model & Behaviors
19
You might need a hat trick...
20
Full Stack Attack at RSA
21
Get Involved and Join the Community
Description:
Explore the intersection of security and DevOps in this 49-minute LASCON conference talk. Delve into the importance of understanding adversaries and hunting down bad actor activity to enhance application safety. Learn about linking security architecture decisions to feedback loops, enumerating attack surfaces, and breaking down architectural basics such as zoning, containment, asset management, authentication, and encryption. Discover the DevSecOps Maturity Model and behaviors, and gain insights into getting ahead of security threats. Engage with practical examples, including a Full Stack Attack demonstration, and find out how to join the DevSecOps community for ongoing learning and collaboration.