DrupalCon Nashville 2018: Defense in Depth: Lessons Learned from Securing 200,000 Sites
Cybersecurity is an ever-evolving battlefield, and it's easy to feel lost in the midst of it it all. Every bit of software in your stack composes compromisable surface area, so how can you be expected to think about security from the OS to the JS, and beyond?
We'll start at the 10,000-foot level, reviewing common myths spread about secure development, then zoom in closer for a look at security best practices, concluding with a deep-dive into a few of the most effective attack mitigation strategies. Experts from Pantheon, Lockr, and Townsend Security will leave you with strategies to handle securing your project with confidence.
Here’s what you’ll learn:
The top 5 security myths and how to best address them in your development workflow
What security means for your business, including compliance and risk management
About each of the layers of your site, what needs to be protected, who needs to be involved, and good tools to use to create a baseline of security
How to handle a security breach and top tips for post-mortem strategies
We'll start at the 10,000-foot level, reviewing common myths spread about secure development, then zoom in closer for a look at security best practices, concluding with a deep-dive into a few of the most effective attack mitigation strategies. Experts from Pantheon, Lockr, and Townsend Security will leave you with strategies to handle securing your project with confidence.
Here’s what you’ll learn:
The top 5 security myths and how to best address them in your development workflow
What security means for your business, including compliance and risk management
About each of the layers of your site, what needs to be protected, who needs to be involved, and good tools to use to create a baseline of security
How to handle a security breach and top tips for post-mortem strategies