Overview
Syllabus
Intro
SOFTWARE SECURITY CRISIS
TOOL SOUP
COST TO ASSESS ONE APPLICATION
RIDICULOUSLY WEAK APPSEC OUTCOMES
PUSHING SECURITY THROUGH DEVELOPMENT DOESN'T WORK
HOW CAN WE GET "SECURITY AS CODE" DEPLOYED?
TYPICAL PENETRATION TESTING
TESTING WITH AN AGENT ON THE INSIDE!
MY FIRST SECURITY INSTRUMENTATION
DYNAMIC BINARY INSTRUMENTATION!
JAVA INSTRUMENTATION API
SECURITY INSTRUMENTATION TODAY
HOW IAST AND RASP WORK
SECURING AN ENTIRE APPLICATION PORTFOLIO IN PARALLEL
A DEVSECOPS-ENHANCED PIPELINE
CONTEXT YIELDS BETTER COVERAGE AND ACCURACY
WHAT'S NEXT FOR SECURITY INSTRUMENTATION?
HARMONIZING DEVELOPMENT AND SECURITY
CONTRAST COMMUNITY EDITION
Taught by
LASCON