This repository has been archived on 2024-11-13. You can view files and clone it, but cannot push or open issues or pull requests.
fediversity_website/content/evenementen/nluug/najaarsconferentie-2022/talks/riccardo-ten-cate-en-glenn-ten-cate-explotation-automation-mitigation.md

52 lines
2.8 KiB
Markdown
Raw Normal View History

---
categories:
date: 2022-11-29T20:31:43+02:00
description:
layout: event-talk
slug:
tags:
title: "Riccardo ten Cate & Glenn ten Cate - Exploitation, automation, mitigation"
speakers:
- riccardo-ten-cate
- glenn-ten-cate
presentation:
filename: 2022-11-29-riccardo-en-glenn-ten-cate-exploitation-automation-mitigation.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=CH2ntnZxZks
---
## Abstract
We can see the trends in integrating security tooling into CI/CD pipelines. However, security tooling alone will not cover your entire attack surface. This is because the tooling can never understand the full context of the applications functions and logic. On the other hand, resources in the form of manual verification can often be scarce and expensive.
Where do we find the right balance between security test automation and manual verification?
Even more importantly, how do we train the developers to understand the metrics and make security part of their process and culture?
OWASP security knowledge framework introduced a new interactive learning platform to teach you everything you need to know about secure software development! SKF helps you deploy sandboxed learning environments on the fly where you find all the tools you need to get yourself going.
Use the OWASP SKF to train yourself or your entire team to exploit and mitigate web application vulnerabilities.
In our session:
* We will show you how the SKF is set-up, so you can get started.
* We will show the labs and demo live exploitation of the labs.
* How do we fix the vulnerabilities? We will use SKF to generate security requirement that guide how to mitigate the vulnerabilities demonstrated in the labs
* We will implement mitigations (requirements) and use the Owasp ZAP (Automation framework) and ZEST to validate the mitigations.
## Biography Riccardo
As a penetration tester from the Netherlands Riccardo ten Cate specialises in application security and has extensive knowledge in securing applications in multiple coding languages. Riccardo has many years of experience in training and guiding development teams becoming more mature and making their applications secure by design.
## Biography Glenn
As a coder, hacker, speaker, trainer and security chapter leader employed at ING Belgium Glenn has over 15 years experience in the field of security. One of the founders of defensive development security trainings dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world.
Not only does Glenn train developers, he and his brother Riccardo also donated an entire knowledge framework solely dedicated to help developers make their code secure by design.
See: SKF (Security knowledge framework) https://www.securityknowledgeframework.org