Implementing a Supply Chain Approach to Build and Deploy Secure Applications - AppSecEU 2016

Implementing a Supply Chain Approach to Build and Deploy Secure Applications - AppSecEU 2016

OWASP Foundation via YouTube Direct link

Introduction

1 of 32

1 of 32

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Implementing a Supply Chain Approach to Build and Deploy Secure Applications - AppSecEU 2016

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Ikkas background
  3. 3 Jenkins vulnerability
  4. 4 Jenkins mitigation
  5. 5 How many Jenkins instances
  6. 6 What is the real cause
  7. 7 Main Central Repository
  8. 8 MITRE Database
  9. 9 Verizon Database
  10. 10 Compound risks
  11. 11 How to prevent this
  12. 12 Standards
  13. 13 PCI DSS
  14. 14 Compliance Ease Security
  15. 15 Supply Chains
  16. 16 Deming
  17. 17 transitive dependencies
  18. 18 Control the quality of your suppliers
  19. 19 Software delivery pipeline
  20. 20 Missing component
  21. 21 Standardization
  22. 22 Catalog Control Point
  23. 23 Leverage Automation
  24. 24 Onion Model of Testing
  25. 25 Security
  26. 26 Rugged Software Factory
  27. 27 Bill of Materials
  28. 28 Reverse Engineering
  29. 29 Leadership
  30. 30 Testdriven development
  31. 31 References
  32. 32 Scaling

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.