What is Security?1
Information vs. Operational Security
Kickstarting Your Security Program2
When to Start Thinking About Security
Getting Buy-In and Support from Leadership
Event Emitters and Streams
The Importance of Security Culture3
Instilling Healthy Security Culture
Practices of Security Culture
Your First Security Hire4
Your Job Description is Terrible
The Skillset You're Looking For
Setting Them Up For Success
Prioritizing the Work5
Fibonacci Scale & The Eisenhower Matrix
Level of Effort vs. Level of Impact
Turning off Easy Mode
Workload Management with Issue tracking6
Ranking Issues
Remove Obstacles
A Data-Driven Security Program7
Making Data Presentable
Terrible Data Examples (and Some Good Ones)
Metrics Aren't Goals
Leveraging Security Frameworks8
How A Security Framework Will Help
Choosing a Security Framework
Establishing a Baseline
Regulation and Compliance9
Keeping Up With New Rules
Business Case for Compliance
Tracking Vulnerabilities10
CVE: Common Vulnerabilities and Exposures
Vulnerabilities Workflow
Planning Your Security Budget11
Your First Year
Example Budgets
Responding to Incidents12
Goals of Incident Response
Conducting Post-Mortems
Threat Modeling13
Methodologies and Techniques
The Worst Case Scenario
Effective Bug Bounty Programs14
What Similar Companies are Doing
The Skillset You're Looking For
Comparison of Bug Bounty Service Providers
Security Audits & Penetration Tests15
When should I get a security review?
Finding reputable researchers & consultants
Least Privilege & Access Controls16
Onboarding & Offboarding
Layered Security with MFA
Monitoring & Alerting17
Smoke Alarms and Monitoring
Modern Infrastructure for Monitoring