It is easy to think that securing a product relies on writing code without vulnerabilities and it's true that this is a very important aspect, but a secure product relies on more than just the code written. To an attacker every aspect involved in the development process, from the human element to the build pipeline, is fair game. In this talk we'll take a candid look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.
Lead Data Scientist @chartbeat. I spend my time thinking about optimization, machine learning, C/Python/x86, computer vision, and pretentious coffee. bio from Twitter
Sign in to add slides, notes or videos to this session