Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications
Michael Taylor - Rook Security
Aug 24, 2016Size: 238.4MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractApplications are only as secure as the network architecture and operating systems in which they operate. It is only a matter of time before services, networks, or applications are targeted by bad actors even if they are not directly exposed to the public Internet. In this seminar we will discuss some of the patterns seen in secure application development and the anti-patterns that should be avoided. Then we will examine how to best implement these practices both as an individual and within organizations throughout the software development lifecycle.
About the SpeakerMichael Taylor is the lead software developer at Rook Security, an Indianapolis-based provider of global IT security solutions that monitors, detects, and remediates cybersecurity threats worldwide. Michael directs the development unit at Rook Security, which creates custom programs to enable the integration of disparate solutions in a client's existing inventory. Michael and his team also invest their efforts in the creation of new data analysis tools for Rook Security to gain new threat intelligence and make smarter security recommendations to its client base. He is an instructor at the Eleven-Fifty Academy and an active participant in the open source community. Michael earned his bachelor’s degree in Information Technology from Western Governors University.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.