The Role of Attack Surface Monitoring Techniques in the OWASP Top 10
Автор: OWASP Los Angeles
Загружено: 2022-03-25
Просмотров: 53
While many OWASP best practices are focused on application security testing techniques, additional insight can be achieved by monitoring data flows outside your firewalls. In addition to adding value relative to the OWASP Top 10, these attack surface monitoring (ASM) techniques can also identify data leaks that are exploitable by adversaries. This presentation will identify several of these techniques and discuss how they can be included in an ongoing monitoring process. The presentation will add context by highlighting real-world examples and outcomes.
PRESENTED BY: Landon Winkelvoss co-founder Nisos, and Tech Principal Vincas Ciziunas
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: