filmov
tv
BOLA, IDOR, MA, BFLA. Welcome to the OWASP API Top 10!
Показать описание
In this presentation, Adam will introduce the audience to the OWASP API TOP 10 Security Threats. Adam will highlight the unique attack vectors that API Applications face, review specific breach examples, and why OWASP felt it necessary to specifically highlight these vulnerabilities in a new Top 10 list. We will also explore various efforts by the security industry to secure API Applications and what businesses should expect as they evaluate an API security solution.
Bio: Adam Fisher is an Enterprise Security Expert whose qualifications include a Bachelor of Science in Information Systems, Master of Business in Information Technology Management, and maintains a number of certifications, CISSP, CCSP, AWS Security Associate, Azure MCP. Adam has a detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets for Fortune 500 companies and Government Agencies. Adam has worked on Secret level clearance projects for the United States Government and the United Kingdom. Deploying security solutions and network technologies while protecting key government data and assets. In addition, Adam is a respected blogger and thought leader on Enterprise Security.
Bio: Adam Fisher is an Enterprise Security Expert whose qualifications include a Bachelor of Science in Information Systems, Master of Business in Information Technology Management, and maintains a number of certifications, CISSP, CCSP, AWS Security Associate, Azure MCP. Adam has a detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets for Fortune 500 companies and Government Agencies. Adam has worked on Secret level clearance projects for the United States Government and the United Kingdom. Deploying security solutions and network technologies while protecting key government data and assets. In addition, Adam is a respected blogger and thought leader on Enterprise Security.
Комментарии