Attacks against enterprises and their technology vendors are facilitated by the current rapid adoption of embedded systems, cloud solutions, and web-based platforms. These attacks often undermine the very monetization, scalability, and user experience goals for which these systems were designed and deployed. As malicious hackers advance their techniques at a staggering pace, often rendering current defense tactics obsolete, so too must security practitioners obsess over deploying progressive techniques.

In this session participants will extract lessons from these attack anatomies to provide a framework to account for these modern attackers, articulate industry context, and form key takeaways, including immediately actionable guidance. You will explore case studies to highlight decision-points, such as the deployment of a third party technology, and analyze the advantages and disadvantages of various decisions on the impact of system security.

In this session, you will learn:

  • About discipline division: security separated from functionality
  • Why perspective matters: white box vs. black box
  • About defense priorities: secure assets, not just perimeters
  • About timing security: build it in, not bolt it on
  • About procedural duration: security as an ongoing process.

Intermediate managers.

Technology discussed in this session:
Embedded systems, cloud solutions, and web-based platforms.