Главная
Study mode:
on
1
Intro
2
Background
3
What we're covering
4
How did we get here?
5
We don't have to...
6
What should we do?
7
Identity Data Management
8
Identity records
9
Live data access
10
Cryptography - data storage
11
Cryptography – practices
12
Cryptography - key considerations
13
Logging and accountability
14
Data de-identification
15
Data retention
16
Basic practices
17
Supply chain management
18
Risk management
19
Future-proofing
20
Resources
Description:
Explore secure application design principles for high data privacy requirements in this 40-minute OWASP Foundation talk by James Bohem. Delve into the evolution of data privacy concerns and learn practical strategies for managing identity data, implementing cryptography for data storage, and ensuring logging accountability. Discover techniques for data de-identification, retention, and supply chain management. Gain insights into risk management practices and future-proofing applications. Acquire valuable resources to enhance your understanding of secure application design in the context of stringent data privacy regulations.

Secure Application Design with High Data Privacy Requirements

OWASP Foundation
Add to list
0:00 / 0:00