Loading Events

« All Events

  • This event has passed.

Austin ISSA Hackable Workshop: Threat Modeling + Secure Coding Practices

October 21 @ 1:00 PM - 5:00 PM

To do application security right, you need to stop doing it wrong.

Security vulnerabilities exist. The question is simply: what to do about it?

This interactive, virtual workshop extracts lessons from the front lines of ethical hacking and security research to teach you how. Applying insights from his forthcoming book Hackable: How to Do Application Security Right, Ted Harrington teaches you ideas, strategies and tactics used by technology juggernauts like Google, Amazon, and Netflix in order to secure systems.

In this half day workshop, you’ll learn:

  • What a threat model is, how to establish one, and how to implement it at your organization.
  • How to build security into the development process, including specific guidance on what actions take during which stage — whether you adhere to a linear-sequential model (e.g. Waterfall) or an iterative one (e.g. Agile).
  • How to remediate security vulnerabilities.

The content is calibrated to a strategic, tactical, implementable level, and won’t be a code-level technical deep dive. The session format includes:

  • Presentation style
  • Group exercise
  • Open discussion

A $250 Value for Only:

  • First 20 Austin ISSA Members: $50
  • Additional Austin ISSA Members: $100
  • Non-Austin ISSA Members: $125

   

Organizer

ISSA Capitol of Texas Chapter
Email:
0
Website:
http://www.austinissa.org
© Copyright 2020, (ISC)² Austin Chapter. All Rights Reserved. (ISC)², CISSP, SSCP, CAP, ISSAP, ISSEP, ISSMP, CSSLP, HCISPP and CBK are registered certification, service, and trademarks of International Information System Security Certification Consortium, Inc.

Disclaimer: (ISC)² does not own, operate, or moderate this website. All content of this site, exclusive of licensed trademarks and trade dress is the property of (ISC)² Austin Chapter, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².”