Главная
Study mode:
on
1
Intro
2
Overview
3
EoL Philosophy
4
How to identify EoL
5
When to move on
6
Risk factors
7
End of life software headlines
8
Aastha Sahni
9
Possible Security Threats
10
Advanced Persistent Threats
11
Prevention Mitigation Strategies
12
Plan Do Check Act
13
SWOT Analysis
14
Conclusion
Description:
Explore the critical topic of End-of-Life (EoL) software security in this comprehensive 51-minute conference talk presented by Anuprita Patankar and Aastha Sahni. Delve into the philosophy behind EoL, learn how to identify outdated software, and understand when it's time to transition to newer solutions. Examine the risk factors associated with using EoL software and review notable headlines related to security breaches. Gain insights into potential security threats, including Advanced Persistent Threats, and discover effective prevention and mitigation strategies. Learn how to implement a Plan-Do-Check-Act cycle and conduct SWOT analysis to enhance your organization's software security posture. This OWASP Foundation-managed presentation provides valuable knowledge for IT professionals, security experts, and decision-makers concerned with maintaining robust cybersecurity practices in the face of evolving software landscapes.

Weakest in the Herd - Securing End-of-Life Software

OWASP Foundation
Add to list
00:00
00:00