Realizing Software Security Maturity - The Growing Pains and Gains

Realizing Software Security Maturity - The Growing Pains and Gains

via YouTube Direct link

Intro

1 of 43

1 of 43

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Realizing Software Security Maturity - The Growing Pains and Gains

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Application Security Programs
  3. 3 Low Security Maturity
  4. 4 Medium Security Maturity
  5. 5 High Security Maturity
  6. 6 Application Security Team
  7. 7 Tactical and Strategic
  8. 8 Program vs No Program
  9. 9 Metrics
  10. 10 Starting from scratch
  11. 11 Existing models
  12. 12 BeSam vs Ideal State
  13. 13 Key Takeaways
  14. 14 Duo Security
  15. 15 The Big Takeaway
  16. 16 Team Values
  17. 17 Engineering
  18. 18 Low Friction
  19. 19 Paved Road
  20. 20 How Could It Go
  21. 21 No Code Left Behind
  22. 22 Security Maturity Model
  23. 23 Compliance
  24. 24 Efficiency
  25. 25 Community Content
  26. 26 Free Time
  27. 27 Microsoft SDL
  28. 28 Training
  29. 29 Security Services
  30. 30 Threat Modeling
  31. 31 Code audits
  32. 32 Security assessments
  33. 33 Security metrics
  34. 34 Functionally
  35. 35 QA
  36. 36 Office Hours
  37. 37 Intake Process
  38. 38 What do they need
  39. 39 TLDR
  40. 40 Kickoff Checklist
  41. 41 Hacking
  42. 42 Security Defects
  43. 43 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.