Главная
Study mode:
on
1
Intro
2
Welcome
3
The Development Process
4
Security Tools
5
CV Counts
6
Threat Modeling
7
Bob Alice
8
Bob Tizen Board
9
SQL Injection
10
Buffer Overflow
11
Change of Culture
12
The Problem with Problem
13
Security Objectives
14
Notable Security Events
15
Expanded Documentation Changes
16
Developer Time
17
Training Module
18
Key of Competence
19
Learning to Apply
20
Training Material
21
JustInTime Learning
22
We Not This Way
23
Checklist Manifesto
24
The Checklist Manifesto
25
Checklist Criteria
26
Security Events
27
The Experiment
28
The Overload
29
Why Not Code Reviews
30
Effects
31
Collab
32
Justintime training
Description:
Explore a conference talk from APPSEC Cali 2018 that delves into innovative approaches for addressing application security challenges. Learn how security practitioners can effectively influence development processes, bridge gaps between training and coding, and implement timely interventions to prevent security flaws. Discover strategies for working collaboratively with developers, testers, and architects to reduce security debt and prevent the recurrence of well-known vulnerabilities. Gain insights from Izar Tarandach, Lead Product Security Architect at Autodesk Inc., as he shares observations from multiple development teams, feedback from peers, and results from pilot tests. Examine topics such as threat modeling, secure development practices, just-in-time learning, and the use of checklists to improve security outcomes. Understand the importance of adapting security practices to match the pace of modern development and the challenges faced by security professionals in today's rapidly evolving technology landscape. Read more

The Best Flaw Didn't Make It Into Production - Addressing Security Gaps in Development

OWASP Foundation
Add to list