CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications

Michael Taylor

Michael Taylor - Rook Security

Aug 24, 2016

Size: 238.4MB

Download: Video Icon MP4 Video  
Watch in your Browser   Watch on Youtube Watch on YouTube


Applications are only as secure as the network architecture and operating systems in which they operate. It is only a matter of time before services, networks, or applications are targeted by bad actors even if they are not directly exposed to the public Internet. In this seminar we will discuss some of the patterns seen in secure application development and the anti-patterns that should be avoided. Then we will examine how to best implement these practices both as an individual and within organizations throughout the software development lifecycle.

About the Speaker

Michael Taylor is the lead software developer at Rook Security, an Indianapolis-based provider of global IT security solutions that monitors, detects, and remediates cybersecurity threats worldwide. Michael directs the development unit at Rook Security, which creates custom programs to enable the integration of disparate solutions in a client's existing inventory. Michael and his team also invest their efforts in the creation of new data analysis tools for Rook Security to gain new threat intelligence and make smarter security recommendations to its client base. He is an instructor at the Eleven-Fifty Academy and an active participant in the open source community. Michael earned his bachelor’s degree in Information Technology from Western Governors University.

Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52 (Suite 050B), West Lafayette Campus. More information...


The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.