What is Security?1
Information vs. Operational SecurityΒ
Kickstarting Your Security Program2
When to Start Thinking About SecurityΒ
Getting Buy-In and Support from LeadershipΒ
Event Emitters and StreamsΒ
The Importance of Security Culture3
Instilling Healthy Security CultureΒ
Practices of Security CultureΒ
Your First Security Hire4
Your Job Description is TerribleΒ
The Skillset You're Looking ForΒ
Setting Them Up For SuccessΒ
Prioritizing the Work5
Fibonacci Scale & The Eisenhower MatrixΒ
Level of Effort vs. Level of ImpactΒ
Turning off Easy ModeΒ
Workload Management with Issue tracking6
Ranking IssuesΒ
Remove ObstaclesΒ
A Data-Driven Security Program7
Making Data PresentableΒ
Terrible Data Examples (and Some Good Ones)Β
Metrics Aren't GoalsΒ
Leveraging Security Frameworks8
How A Security Framework Will HelpΒ
Choosing a Security FrameworkΒ
Establishing a BaselineΒ
Regulation and Compliance9
Keeping Up With New RulesΒ
Business Case for ComplianceΒ
Tracking Vulnerabilities10
CVE: Common Vulnerabilities and ExposuresΒ
Vulnerabilities WorkflowΒ
Planning Your Security Budget11
Your First YearΒ
Example BudgetsΒ
Responding to Incidents12
Goals of Incident ResponseΒ
Conducting Post-MortemsΒ
Threat Modeling13
Methodologies and TechniquesΒ
The Worst Case ScenarioΒ
Effective Bug Bounty Programs14
What Similar Companies are DoingΒ
The Skillset You're Looking ForΒ
Comparison of Bug Bounty Service ProvidersΒ
Security Audits & Penetration Tests15
When should I get a security review?Β
Finding reputable researchers & consultantsΒ
Least Privilege & Access Controls16
Onboarding & OffboardingΒ
Layered Security with MFAΒ
Monitoring & Alerting17
Smoke Alarms and MonitoringΒ
Modern Infrastructure for MonitoringΒ