Overview
Syllabus
Intro
Organizations have no lack of relevancy
Loyalty bill hack
Statistics
Money
Software insecurity wrong
Asymmetric arms race
Traditional model
Too many variables
The accepted world
The attacker schedule
The idea of risk
Timelimited approach
Clientside tools
Internal tools
Cheeseburger analogy
Software food chain
Opensource vulnerability statistics
Spring vulnerability
Patch management
Biting off more
Large scale vulnerabilities
Where we are
Data consumption
Enterprise Security Intelligence
Information Flooding
Context
Compliance
Kinder Eggs
Legal in USA
Conclusion
Outro
Taught by
OWASP Foundation