Главная
Study mode:
on
1
Intro
2
The Attacks
3
Dedicated Secure Device
4
Better security is possible
5
Outline
6
Scorecard
7
Malware
8
Phishing
9
Credential Theft
10
Secure Zone
11
Put it all together
12
Setup Step 1
13
Setup Step 2
14
Setup Step 3
15
How does Two Laptops Work in Practice?
16
Lessons
17
The End
Description:
Explore a comprehensive security strategy using Chromebooks and network motes to enforce security posture from device to cloud in this 31-minute OWASP Foundation talk. Discover how to balance developer productivity with robust security measures, addressing the challenges of providing secure access to high-stakes production environments while granting admin rights on personal devices. Learn from the speaker's experience in implementing Chromebooks as a solution, including the technical hurdles encountered and overcome. Gain insights into protecting against malware, phishing, and credential theft while establishing secure zones and implementing a two-laptop approach. Understand the practical implications of this security model and the valuable lessons learned throughout the implementation process.

Chromebooks and Network Motes: Enforcing Security Posture from Device to Cloud

OWASP Foundation
Add to list