Главная
Study mode:
on
1
Intro
2
Dont use the hacker hoodie
3
Use the OWASP resources
4
Insecure Design
5
Security Configurations
6
Continuous Review
7
Dependencies
8
Financial Impact
9
Securing
10
Protecting Users
11
Social Media
12
Code Corruption
13
Not everything is safe
14
Security Hygiene
15
Medicare
16
DJ
17
Texas
18
Our responsibility
19
Wrap up
Description:
Discover innovative techniques for creating engaging end-user AppSec training using LEGO bricks and minifigures. Learn how to leverage humor and visual storytelling to enhance retention of security concepts. Explore creative examples like depicting a constructor worker as a Builder, a pirate as a Breaker, and a gamer as a Defender. Dive into security topics such as injection vulnerabilities, component supply chain risks, and known vulnerabilities through clever LEGO representations. Gain insights on designing effective security guides, utilizing OWASP resources, and addressing various aspects of application security including insecure design, security configurations, and continuous review. Understand the financial impact of security breaches, learn best practices for protecting users and securing social media, and explore the importance of code integrity and security hygiene. This talk emphasizes the shared responsibility in maintaining robust application security and provides practical, memorable ways to communicate critical security concepts to end-users. Read more

Making End User AppSec Training Engaging with Building Bricks

LASCON
Add to list