Главная
Study mode:
on
1
Introduction
2
About Ryan Elkins
3
How can security be simple
4
Security is like a puzzle
5
You dont need bottomless pockets
6
Security requires passionate people
7
Building a program
8
Zero day
9
Common attack vector
10
Curiosity
11
Set
12
Metaphor Module
13
What to Protect Against
14
User Awareness
15
Make Security the Trend
16
Quick Game
17
Attack Dogs
18
Users Cant Always Protect
19
Endpoint System Protection
20
Centralized Management
21
Network Protection
22
Application Security
23
Application sprawl
24
Review all applications
25
Training developers
26
I dont know code
27
Checklist
28
Application Risks
29
Review Checklist
30
Review Categories
31
Passwords
32
Cookies
33
Databases
34
Input Validation
35
Output Encoding
36
Transport Layer
37
Web Config
38
Encryption
39
ThirdParty Applications
40
ThirdParty Code
41
Search Strings
42
Application Reviews
43
Database Security
44
Integrated Authentication
45
Vulnerability Management
46
Cloud Storage
47
Centralization
48
Baselines
49
Risk Acceptance Model
50
Time to Build
51
Closing Thoughts
Description:
Learn essential cybersecurity strategies to defend against sophisticated cyber threats in this 45-minute video from Derbycon 2012. Explore how to build a robust security program without breaking the bank, focusing on passionate people and simple yet effective solutions. Discover key areas of protection including user awareness, endpoint systems, network security, and application security. Gain insights into managing application risks, implementing secure coding practices, and addressing database vulnerabilities. Understand the importance of centralized management, risk acceptance models, and cloud storage security. Apply practical tips and techniques to strengthen your organization's cyber defenses against an army of cyber ninja warriors.

Simple Security Defense to Thwart an Army of Cyber Ninja Warriors

Add to list