Thursday 28th January, 2016
12:00pm to 1:00pm
We all know we have people like Anonymous, LulzSec, and NSA around. With this in mind, shouldn’t we start thinking about the security of our systems? Well, of course. But, could you turn your knowledge of DDD into an advantage for understanding and counteracting security vulnerabilities? Yes, you could. This session is about exactly that.
“Business” and “technical” attacks are two kinds of attacks, where the latter is the most famous, e g SQL Injection and Cross-Site Scripting. But this doesn’t mean business attacks are less harmful. On the contrary, attacks on the business tend to be extremely sophisticated and powerful as they often leave the infrastructure intact and trigger no alarms.
Domain Driven Security is the field that counteracts both types of attacks by using tools and mindsets from DDD in a clever way.
Secure Domain Philosopher
Agile aficionado; Domain Driven Design enthusiast; code quality craftsman, with a long time interest in security. The combination made Dan use quality practices from DDD to address application security issues - thus coining "Domain Driven Security" together with John Wilander around 2009.
Coder and Quality defender; fights security trolls on a daily basis using Domain Driven Design and a security mindset. Daniel's extensive experience ranges from patient critical pacemaker systems to high performant software in the gaming industry. Combining this with his passion for DDD and his interest in security has made him a strong advocate of Domain Driven Security.
Sign in to add slides, notes or videos to this session