safeguarding applications from cyber attacks
DESCRIPTION
Jim Harris' Safeguarding Applications from Cyber AttacksTRANSCRIPT
- 1. Safeguarding Applications from Cyber Attacks Jim Harris US Army Signal Corp Non Commissioned Officer, Retired Adobe ColdFusion Summit 2014
- 2. Talking Points Credibility Posture Exterior Threats Interior Access to Data Adobe ColdFusion Summit 2014
- 3. Credibility 20 Years US Army Signal Corps NATO Level Top Secret Communications Security Clearance (COMSEC) 15 Years Lead Programmer Software for Corporate Legal Departments Adobe ColdFusion Summit 2014
- 4. Credibility Adobe ColdFusion Summit 2014
- 5. Credibility Adobe ColdFusion Summit 2014
- 6. Posture Adobe ColdFusion Summit 2014
- 7. Exterior Threats Adobe ColdFusion Summit 2014
- 8. Exterior Threats Adobe ColdFusion Summit 2014
- 9. Exterior Threats Adobe ColdFusion Summit 2014
- 10. Adobe ColdFusion Summit 2014
- 11. Exterior Threats Adobe ColdFusion Summit 2014
- 12. Exterior Threats Adobe ColdFusion Summit 2014
- 13. Exterior Threats Adobe ColdFusion Summit 2014
- 14. Exterior Threats Adobe ColdFusion Summit 2014
- 15. Exterior Threats Adobe ColdFusion Summit 2014
- 16. Exterior Threats Adobe ColdFusion Summit 2014
- 17. Exterior Threats OWASP Top 10 1.Injection 2.Broken Authentication and Session Management 3.Cross-Site Scripting (XSS) 4.Insecure Direct Object References 5.Security Misconfiguration 6.Sensitive Data Exposure 7.Missing Function Level Access Control 8.Cross-Site Request Forgery (CSRF) 9.Using Components with Known Vulnerabilities 10.Unvalidated Redirects and Forwards Adobe ColdFusion Summit 2014
- 18. Exterior Threats Adobe ColdFusion Summit 2014
- 19. Exterior Threats Adobe ColdFusion Summit 2014
- 20. Exterior Threats Adobe ColdFusion Summit 2014
- 21. Interior Access to Data Adobe ColdFusion Summit 2014
- 22. Adobe ColdFusion Summit 2014
- 23. Adobe ColdFusion Summit 2014
- 24. Adobe ColdFusion Summit 2014
- 25. Adobe ColdFusion Summit 2014
- 26. Adobe ColdFusion Summit 2014