Food Safety Trends 2020. Free Online Mitap April 21

Let’s talk about new trends, approaches, tools and challenges that arise in front of information security departments today. Storage of data in the clouds, work with third-party vendors and solutions, automation of security review in the context of continuous development and release process, and much more – at the free online meeting Wrike TechClub. registration – until April 21.

In a programme:

1. Gregory Streltsov, Wrike – “Automation of Safe Development”

Large inter-product products are faced with the need to automate their daily routine, including in terms of information security. Together with other departments of the company, we came up with an automation process based on a number of open source solutions and Burp Suite. Burp Suite is a popular vulnerability assessment tool. I will tell you how to integrate it into the existing development cycle, show what difficulties you may encounter, and also discuss all the advantages and disadvantages of a configured system.

2. Dmitry Desyatkov, Wrike – “Don’t Believe Anyone!”

It is very difficult to imagine a product that would do without third-party libraries, vendors or integrations. They save development time, provide more features and make the product more competitive. But you have to pay for everything. The safety of the weakest part of the product determines the safety of the entire product. Let’s discuss the types of third party components and what can be done to minimize the risks of working with them.

3. Sergey Belov, Mail.ru – the topic is being specified

4. Oleg Maslennikov, TsIAN – “Securing Microservice Architecture in Kubernetes”

Active development of DevOps ideas and microservice architecture has led to the popularization of containerization in mass volumes, when the product is represented by hundreds of microservices. This situation made it necessary to somehow manage the work and layout of all these microservices. The most popular solution to this problem is Kubernetes. In addition to solving operational problems, it also allows you to deal with some common problems in the field of information security inherent in microservice applications. But the functionality provided by Kubernetes often has unobvious or clearly undeclared pitfalls. I’ll tell you how Kubernetes works inside, how it differs from a simple Docker, and what security features it has in various configurations.

5. Julia Omelyanenko, Wrike – COVID-19: don’t let the virus get into your network from the air

Food safety is not limited to the food environment; the human factor remains its main engine. The current situation in the world has given impetus to the development of remote work. But the attackers do not doze off and come up with new attack vectors, keeping pace with the times. We’ll talk about approaches to meeting corporate security requirements and how they can help you.

6. Alexandra Svatikova, Odnoklassniki – “Security of a user account – a look from inside the online service”

In the report I will tell you where hacked accounts come from and why the absence of vulnerabilities does not guarantee the complete safety of users of the social network. Then we try to understand why, with all its simplicity and clarity ,redential stuffing is the most common way to attack online services. I will share our observations of such attacks over the past few years and the experience of implementing measures to counter them, as well as talk about the problems that we encountered along the way.

registration

Similar Posts

Leave a Reply