Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12
Introduction
00:00 • 2min
Sequel Injection - A Brief History
02:02 • 4min
Pen Testing - How Do You Think the Industry Approaches Pen Testing?
06:09 • 3min
Pentesting - Threat Modeling
09:04 • 4min
Application Risk Profiling
13:30 • 5min
How to Sort People in Excel
18:05 • 2min
How to Make Pivoting Tables Work in an Enterprise?
20:10 • 4min
Is the Apse Engineering Group the Expert to Answer the Questions?
24:07 • 3min
Governance in the Enterprise
26:53 • 5min
Changing the Risk Profile of Your Application?
31:32 • 3min
Application Risk Profiling - What Advice Would You Give to a New Developer?
34:13 • 5min
Application Risk Profiling - A Single Key Take Away
39:37 • 3min