Completed
Cost of Discovery
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Building a Modern Security Engineering Organization
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 How is technology changing
- 3 Cost of the attack
- 4 Near instantaneous deployment
- 5 Waterfall model
- 6 Etsy
- 7 Waterfall
- 8 Feature Flags
- 9 Security vs Control
- 10 The system isnt dangerous
- 11 It doesnt matter
- 12 Deployment time
- 13 Old methodology
- 14 What makes it safe
- 15 Invisibility instrumentation
- 16 Security insight
- 17 The big lesson
- 18 The key
- 19 Binary events
- 20 The two worlds
- 21 The shift around
- 22 Function by removing blockers
- 23 We are the blocker
- 24 Mindset shift
- 25 Being a jerk
- 26 Making realistic tradeoffs
- 27 The security chart moment
- 28 How easy it is to exploit
- 29 Random culture
- 30 Reward behavior
- 31 Bad days
- 32 Dont be a jerk
- 33 Reward good behaviour
- 34 National responses
- 35 How to scale
- 36 Access control in startups
- 37 Pressure from different points
- 38 Whether its regulatory compliance
- 39 You can take away access but
- 40 This is a hard step
- 41 The key lesson learned
- 42 Destroy your credibility
- 43 Magic
- 44 Central Locking
- 45 End State
- 46 Budget Concerns
- 47 Above Bounty
- 48 Cost of Discovery
- 49 Metrics
- 50 Mark
- 51 Quality and Credit
- 52 Pen Testing
- 53 Vulnerability Enumeration
- 54 Pentest
- 55 Feedback Loop
- 56 GoalOriented
- 57 Scope
- 58 Realistic
- 59 Logistical
- 60 Data
- 61 Why
- 62 Behaviors Patterns
- 63 Attack Profile
- 64 Life Against Death