In this episode of CISO Tradecraft, host G. Mark Hardy delves into the crucial topic of the OWASP Top 10 Web Application Security Risks, offering insights on how attackers exploit vulnerabilities and practical advice on securing web applications. He introduces OWASP and its significant contributions to software security, then progresses to explain each of the OWASP Top 10 risks in detail, such as broken access control, injection flaws, and security misconfigurations. Through examples and recommendations, listeners are equipped with the knowledge to better protect their web applications and ultimately improve their cybersecurity posture.
OWASP Cheat Sheets: https://cheatsheetseries.owasp.org/
OWASP Top 10: https://owasp.org/www-project-top-ten/
Transcripts: https://docs.google.com/document/d/17Tzyd6i6qRqNfMJ8OOEOOGpGGW0S8w32
Chapters
#20 - Zero Trust
#19 - Team Building
#18 - Executive Presence
#17 - Global War on Email
#16 - The Essential Eight
#15 - IT Governance
#14 - How to Compare Software
#13 - Executive Competencies
#12 - The Three Ways of DevOps
#11 - Cryptography
#10 - Securing the Cloud
#9 - Introduction to the Cloud
#8 - Crucial Conversations
#7 - DevOps
#6 - Change Management
#5 - Cyber Frameworks
#4 - Asset Management
#3 - How to Read Your Boss
#2 - Principles of Persuasion
#1 - What is a CISO?
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon