Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive security strategy using Chromebooks and network motes to enforce security posture from device to cloud in this 31-minute OWASP Foundation talk. Discover how to balance developer productivity with robust security measures, addressing the challenges of providing secure access to high-stakes production environments while granting admin rights on personal devices. Learn from the speaker's experience in implementing Chromebooks as a solution, including the technical hurdles encountered and overcome. Gain insights into protecting against malware, phishing, and credential theft while establishing secure zones and implementing a two-laptop approach. Understand the practical implications of this security model and the valuable lessons learned throughout the implementation process.
Syllabus
Intro
The Attacks
Dedicated Secure Device
Better security is possible
Outline
Scorecard
Malware
Phishing
Credential Theft
Secure Zone
Put it all together
Setup Step 1
Setup Step 2
Setup Step 3
How does Two Laptops Work in Practice?
Lessons
The End
Taught by
OWASP Foundation