All Videos Tagged security (CISO Platform) - CISO Platform 2019-05-21T15:21:19Z http://www.cisoplatform.com/video/video/listTagged?tag=security&rss=yes&xn_auth=no Using 8020 rule in Application Security Management tag:www.cisoplatform.com,2017-02-28:6514552:Video:51587 2017-02-28T07:23:54.651Z Gireesh Kumar http://www.cisoplatform.com/profile/GireeshKumar <a href="http://www.cisoplatform.com/video/using-8020-rule-in-application-security-management"><br /> <img alt="Thumbnail" height="180" src="http://api.ning.com:80/files/9wmaFlQfz*ccd*nINuRe1zLiOPYfxlrpDtVzoTJQUbrSjhJbVBsc-AEmSbxdB8D0oLtBZGVHgWe4bnlcTDTA*QM5333KQ8HE/1253291348.jpeg?width=240&amp;height=180" width="240"></img><br /> </a> <br></br>What will you learn?<br></br> -How to create a prioritization plan for your application security strategy?<br></br> -Which are the top 20% actions that will result in 80% of the results?<br></br> -How to minimize your effort and budget?<br></br> -What are the top mistakes one make in building an App Sec program?<br></br> -How to build your Application Security Program for… <a href="http://www.cisoplatform.com/video/using-8020-rule-in-application-security-management"><br /> <img src="http://api.ning.com:80/files/9wmaFlQfz*ccd*nINuRe1zLiOPYfxlrpDtVzoTJQUbrSjhJbVBsc-AEmSbxdB8D0oLtBZGVHgWe4bnlcTDTA*QM5333KQ8HE/1253291348.jpeg?width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />What will you learn?<br /> -How to create a prioritization plan for your application security strategy?<br /> -Which are the top 20% actions that will result in 80% of the results?<br /> -How to minimize your effort and budget?<br /> -What are the top mistakes one make in building an App Sec program?<br /> -How to build your Application Security Program for 2013. How to Embed Risk Assessment into your Project Workstream tag:www.cisoplatform.com,2015-02-09:6514552:Video:30289 2015-02-09T10:35:01.417Z pritha http://www.cisoplatform.com/profile/pritha <a href="http://www.cisoplatform.com/video/how-to-embed-risk-assessment-into-your-project-workstream"><br /> <img alt="Thumbnail" height="180" src="http://api.ning.com:80/files/nLML9an*avpQLXxo3ErR57iHJw4BCIa1lNtuTy-ZqGGWiZVO-PVMqLmLogEpkAm7wRqsGNh4v0MZJy0eQQLbhP8K8Ea89w-2/1110433028.jpeg?width=240&amp;height=180" width="240"></img><br /> </a> <br></br>Embedding risk assessment into your project workstream by Michael Calderin - Security Officer, Bupa Global Latin America Position information security more… <a href="http://www.cisoplatform.com/video/how-to-embed-risk-assessment-into-your-project-workstream"><br /> <img src="http://api.ning.com:80/files/nLML9an*avpQLXxo3ErR57iHJw4BCIa1lNtuTy-ZqGGWiZVO-PVMqLmLogEpkAm7wRqsGNh4v0MZJy0eQQLbhP8K8Ea89w-2/1110433028.jpeg?width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Embedding risk assessment into your project workstream by Michael Calderin - Security Officer, Bupa Global Latin America Position information security more s... Database Threats 101: SQL Injection tag:www.cisoplatform.com,2013-01-22:6514552:Video:3689 2013-01-22T12:29:32.205Z CISO Platform http://www.cisoplatform.com/profile/06chlks3jaa2a <a href="http://www.cisoplatform.com/video/database-threats-101-sql-injection"><br /> <img alt="Thumbnail" height="180" src="http://api.ning.com:80/files/7-Zkqgft1OdDDpHzmWkdJxHzupaUzc4dHgktiV9Ej9F3kOU81Cg8ZItsK1EWv2cv1*lVKxLWKrXeJBHfYq91NYwUZZvBWjPE/412636401.jpeg?width=240&amp;height=180" width="240"></img><br /> </a> <br></br>In this edition of SecuritySHORTS, we examine SQL injection -- the most common attack threatening Web connected databases today. Most often viewed as a tool employed by external hackers, SQL injection has been increasingly utilized by malicious insiders to exploit easily susceptible database vulnerabilities. How? This short video illustrates a SQL injection attack against a… <a href="http://www.cisoplatform.com/video/database-threats-101-sql-injection"><br /> <img src="http://api.ning.com:80/files/7-Zkqgft1OdDDpHzmWkdJxHzupaUzc4dHgktiV9Ej9F3kOU81Cg8ZItsK1EWv2cv1*lVKxLWKrXeJBHfYq91NYwUZZvBWjPE/412636401.jpeg?width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />In this edition of SecuritySHORTS, we examine SQL injection -- the most common attack threatening Web connected databases today. Most often viewed as a tool employed by external hackers, SQL injection has been increasingly utilized by malicious insiders to exploit easily susceptible database vulnerabilities. How? This short video illustrates a SQL injection attack against a database and also provides key mitigation tools and solutions to bolster overall database security.