Being Powerful While Powerless - Elevating Security By Leading Without Authority

Being Powerful While Powerless - Elevating Security By Leading Without Authority

OWASP Foundation via YouTube Direct link

Introduction

1 of 33

1 of 33

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Being Powerful While Powerless - Elevating Security By Leading Without Authority

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Being the only member of the security team
  3. 3 What responsibilities I had
  4. 4 How much work is involved
  5. 5 What was up against me
  6. 6 Technical strategies
  7. 7 Push left
  8. 8 Writing code
  9. 9 Automating
  10. 10 Code Analysis
  11. 11 Vulnerability Management
  12. 12 Pentesting
  13. 13 Bug Bounty
  14. 14 Cultural Strategies
  15. 15 Key Stakeholders
  16. 16 Everything is okay
  17. 17 Be authentic
  18. 18 Be accessible
  19. 19 Teach different classes
  20. 20 When all of this works
  21. 21 Example
  22. 22 Not clicking on phishing emails
  23. 23 Working with engineers
  24. 24 Its not easy
  25. 25 Technical perspective
  26. 26 Cultural perspective
  27. 27 Being powerful while powerless
  28. 28 Conclusion
  29. 29 Does this work yet
  30. 30 Dealing with conflict
  31. 31 Premise or cloud
  32. 32 Difficult players
  33. 33 Managing priorities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.