Completed
Compliance
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Application Security - Challenging Traditional Approaches and Controls
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Organizations have no lack of relevancy
- 3 Loyalty bill hack
- 4 Statistics
- 5 Money
- 6 Software insecurity wrong
- 7 Asymmetric arms race
- 8 Traditional model
- 9 Too many variables
- 10 The accepted world
- 11 The attacker schedule
- 12 The idea of risk
- 13 Timelimited approach
- 14 Clientside tools
- 15 Internal tools
- 16 Cheeseburger analogy
- 17 Software food chain
- 18 Opensource vulnerability statistics
- 19 Spring vulnerability
- 20 Patch management
- 21 Biting off more
- 22 Large scale vulnerabilities
- 23 Where we are
- 24 Data consumption
- 25 Enterprise Security Intelligence
- 26 Information Flooding
- 27 Context
- 28 Compliance
- 29 Kinder Eggs
- 30 Legal in USA
- 31 Conclusion
- 32 Outro