Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Security Model Bedfellows

BruCON Security Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
The course aims to teach learners how to involve procurement, security, and legal teams in establishing security requirements within vendor contracts to prevent vulnerabilities in software. The course covers a three-step action plan and a framework for engaging these teams effectively. Learners will acquire skills in identifying security issues early, negotiating security requirements with vendors, and implementing secure software development practices. The teaching method includes a case study, examples, and practical guidance on engaging legal and procurement departments. This course is intended for security professionals, developers, and individuals involved in software procurement and vendor management.

Syllabus

Intro
Layer 9 Security Controls
The Agenda
The Reality
Broken Security
The Situation
Example Problem
What We Need We need
The Solution: Buckets
Bucket: Hosting Stuff
Bucket: Bespoke Development
Bucket: COTS / SaaS
What Does It Mean To Be In A Bucket?
Example Contract Language Infrastructure
Guidance To Legal/Procurement
Example Vendor Bad Behaviour
Worked Example
We Don't Win Every Point
Quid Pro Quo
Layer 9 Attack and Defence
Doing It Yourself

Taught by

BruCON Security Conference

Reviews

Start your review of Security Model Bedfellows

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.