Главная
Study mode:
on
1
Intro
2
Thank you
3
Allisons background
4
David and Goliath
5
Attack Defend
6
Choice Models
7
Example
8
Happy Paths
9
Analytics
10
Statistics
11
Fraud
12
Useful Signals
13
Enforcement
14
Takeaways
15
Questions
Description:
Explore the future of cybersecurity in this keynote address from OWASP AppSec EU 2018. Delve into the challenges faced by modern defenders as they adapt to an ever-evolving ecosystem with expanding exposure surfaces, increasing complexity, and continuous change. Learn how to move beyond traditional "castle and moat" tactics and design more defensible systems that can operate in real-time at internet scale. Discover new models and design approaches for protecting platforms, applications, and services while safeguarding millions of customers, transactions, endpoints, and actions daily. Gain insights into the technologies needed to advance defense strategies beyond the perimeter, and understand the importance of analytics, statistics, and fraud detection in creating robust security measures. Engage with concepts such as choice models, happy paths, and useful signals in the context of cybersecurity, and leave with valuable takeaways for implementing cutting-edge defense strategies in your own organization. Read more

Perimeter-less - Engineering the Future of Defense

OWASP Foundation
Add to list