mobile application (in)security - 2nd integrity smart executive breakfast
TRANSCRIPT
2
• Enquadramento
• Componentes de uma Mobile App
• OWASP Mobile Top 10
• Exemplos práticos
• Impacto no Negócio
• Como proteger o ecossistema
• Q&A
/// Agenda
2
3636
/// Impacto no Negócio
Data Leakage
Identity Theft
Fraud
Reputation Damage
Financial data compromise
3737
/// Impacto no Negócio
Data Leakage
Identity Theft
Fraud
Reputation Damage
Financial data compromise
PCI Violations
41
Defense-In-Depth
Secure Development Best Practises (OWASP)
41
Developer Awareness and Training
/// Como proteger o Ecossistema
42
Defense-In-Depth
Secure Development Best Practises (OWASP)
Threat Modeling
42
Developer Awareness and Training
/// Como proteger o Ecossistema
43
Defense-In-Depth
Secure Development Best Practises (OWASP)
Threat Modeling
Continuous Penetration Testing
43
Developer Awareness and Training
/// Como proteger o Ecossistema