Overview
Syllabus
Intro
Being a security target is costly
Equifax breach focused attention on open source risk
So what is "data" anyway?
What about "data privacy" then?
Example: New user with email identifier
Example: Assumption of valid email
"Consent" is a tricky concept
"Trust" is the most complex of the concepts
Top 12 questions when managing collected data
GOPR actions not just for data breaches
Reputational damage factors
Anonymizing shared data doesn't guarantee privacy
Web service APIs change risk dynamic
Managing consent can be complicated
loT development requires multiple disciplines
Identity security targets from platform requirements
Select development frameworks and environment
Continuous security assessments during development
Continuous security assessments during build
Confirm governance and security target progress
Key open source centric takeaways
Taught by
Linux Foundation