Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Implementing a Supply Chain Approach to Build and Deploy Secure Applications - AppSecEU 2016
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Ikkas background
- 3 Jenkins vulnerability
- 4 Jenkins mitigation
- 5 How many Jenkins instances
- 6 What is the real cause
- 7 Main Central Repository
- 8 MITRE Database
- 9 Verizon Database
- 10 Compound risks
- 11 How to prevent this
- 12 Standards
- 13 PCI DSS
- 14 Compliance Ease Security
- 15 Supply Chains
- 16 Deming
- 17 transitive dependencies
- 18 Control the quality of your suppliers
- 19 Software delivery pipeline
- 20 Missing component
- 21 Standardization
- 22 Catalog Control Point
- 23 Leverage Automation
- 24 Onion Model of Testing
- 25 Security
- 26 Rugged Software Factory
- 27 Bill of Materials
- 28 Reverse Engineering
- 29 Leadership
- 30 Testdriven development
- 31 References
- 32 Scaling