Главная
Study mode:
on
1
Intro
2
How is technology changing
3
Cost of the attack
4
Near instantaneous deployment
5
Waterfall model
6
Etsy
7
Waterfall
8
Feature Flags
9
Security vs Control
10
The system isnt dangerous
11
It doesnt matter
12
Deployment time
13
Old methodology
14
What makes it safe
15
Invisibility instrumentation
16
Security insight
17
The big lesson
18
The key
19
Binary events
20
The two worlds
21
The shift around
22
Function by removing blockers
23
We are the blocker
24
Mindset shift
25
Being a jerk
26
Making realistic tradeoffs
27
The security chart moment
28
How easy it is to exploit
29
Random culture
30
Reward behavior
31
Bad days
32
Dont be a jerk
33
Reward good behaviour
34
National responses
35
How to scale
36
Access control in startups
37
Pressure from different points
38
Whether its regulatory compliance
39
You can take away access but
40
This is a hard step
41
The key lesson learned
42
Destroy your credibility
43
Magic
44
Central Locking
45
End State
46
Budget Concerns
47
Above Bounty
48
Cost of Discovery
49
Metrics
50
Mark
51
Quality and Credit
52
Pen Testing
53
Vulnerability Enumeration
54
Pentest
55
Feedback Loop
56
GoalOriented
57
Scope
58
Realistic
59
Logistical
60
Data
61
Why
62
Behaviors Patterns
63
Attack Profile
64
Life Against Death
Description:
Explore the evolution of security engineering in modern software development environments in this OWASP AppSec California 2015 conference talk. Delve into practical strategies for building and scaling contemporary AppSec and NetSec programs, gain insights on launching successful bug bounty initiatives, and learn techniques for conducting realistic attack simulations to identify compromise signals in your ecosystem. Discover how continuous deployment and DevOps philosophies have transformed business operations and how security teams can effectively adapt to these changes. Benefit from the expertise of Zane Lackey, Founder/CSO at Signal Sciences, as he shares lessons learned from his experience as Director of Security Engineering at Etsy and Senior Security Consultant at iSEC Partners. Gain valuable knowledge on topics such as feature flags, security instrumentation, mindset shifts in security practices, access control in startups, and the importance of realistic trade-offs in security decision-making. Read more

Building a Modern Security Engineering Organization

OWASP Foundation
Add to list
0:00 / 0:00