Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Maturing Your Application Security Program - Tanya Janca

Автор: OWASP London

Загружено: 2025-01-21

Просмотров: 316

Описание:

"Maturing Your Application Security Program" - Tanya Janca

After working with over 300 companies on their application security programs the most common question I receive is “what’s next?”. They want to know how to mature their programs, and when they look at the maturity models available, they find them intimidating and so far beyond their current maturity level that they feel impossible. In this talk I will take you through 3 common AppSec program maturity levels I have encountered over the years, with practical and actionable next steps you could take immediately to improve your security posture.

SPEAKER BIO
Tanya Janca, also known as SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of "We Hack Purple", an online learning community that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty five years, won countless awards, and has been everywhere from public service to tech giants, writing software, leading communities, founding companies and ‘securing all the things’. She is an award-winning public speaker, active blogger & podcaster and has delivered hundreds of talks on 6 continents. Tanya values diversity, inclusion, and kindness, which shines through in her countless initiatives. Advisor: Nord VPN, Aiya Corp Faculty: IANs ResearchFounder: We Hack Purple, OWASP DevSlop, #CyberMentoringMonday, WoSEC

The slide deck of this presentation can be downloaded here: https://github.com/OWASP/www-chapter-...

This talk was presented at the OWASP London Chapter meetup on January 15th, 2025 hosted by Just Eat Technology and sponsored by Smithy.Security

Maturing Your Application Security Program - Tanya Janca

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Go Hack Yourself: API Hacking for Beginners - Dr Katie Paxton-Fear

Go Hack Yourself: API Hacking for Beginners - Dr Katie Paxton-Fear

Become an Application Security Engineer | Roadmap

Become an Application Security Engineer | Roadmap

2025 is the year of Agentic AI, but what IS Agentic AI? - Spyros Gasteratos

2025 is the year of Agentic AI, but what IS Agentic AI? - Spyros Gasteratos

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code - Sonya Moisset

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code - Sonya Moisset

Я в опасности

Я в опасности

Application Security Penetration Testing Interview Questions

Application Security Penetration Testing Interview Questions

Deep Dive into the OWASP Top 10 for Agentic AI Applications - John Sotiropoulos

Deep Dive into the OWASP Top 10 for Agentic AI Applications - John Sotiropoulos

Learn Application Security Testing in 2024

Learn Application Security Testing in 2024

Модель контекстного протокола (MCP), четко объясненная (почему это важно)

Модель контекстного протокола (MCP), четко объясненная (почему это важно)

LLM Attacks and Defences - Prompt Hacking - Dominic Whewell

LLM Attacks and Defences - Prompt Hacking - Dominic Whewell

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

How I Would Learn Cyber Security (If I Could Start Over)

How I Would Learn Cyber Security (If I Could Start Over)

Securing the Software Supply Chain in the Age of AI, Malware, and Compliance - Matthew Brady

Securing the Software Supply Chain in the Age of AI, Malware, and Compliance - Matthew Brady

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Scaling Threat Modeling with a Developer-Centric Approach - Andrew Hainault & Andrea Scaduto

Scaling Threat Modeling with a Developer-Centric Approach - Andrew Hainault & Andrea Scaduto

The Windows 11 Disaster That's Killing Microsoft

The Windows 11 Disaster That's Killing Microsoft

120 МИЛЛИАРДОВ: КТО и Зачем создал БИТКОИН? Тайна Сатоши Накамото

120 МИЛЛИАРДОВ: КТО и Зачем создал БИТКОИН? Тайна Сатоши Накамото

Синьор 1С: 10 привычек, без которых ты не вырастешь

Синьор 1С: 10 привычек, без которых ты не вырастешь

Do I need coding for Cyber Security? [FINAL ANSWER, come fight me]

Do I need coding for Cyber Security? [FINAL ANSWER, come fight me]

OWASP Agentic AI Top 10 Kick off Global Call

OWASP Agentic AI Top 10 Kick off Global Call

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com