Developing Security-Minded Employees

Defense Beyond Organizational Boundaries

Developing and sustaining an effective security culture helps mitigate against a range of threats that could cause physical, reputational or financial damage to an organization. Security culture refers to a set of shared values that influence people’s approach to security. Getting this right helps develop a security conscious workforce, and promotes desired security behaviors.

While most security and compliance teams are leading the charge with state of the art tools to secure your organization, if you aren’t engaging your employees, you’re neglecting both your biggest risk and your greatest asset. And, as the workplace extends beyond physical office boundaries, the risks increase.

Organizations face two big challenges when it comes to strengthening their human firewalls: the bad guys’ tactics are always evolving; and changing human behavior is a continuous, complex process. Traditional security awareness programs are not enough—you need to develop Security-Minded Employees. 

In this webinar, Larry Cates, President, and CEO and Amy Holloway, Product and Learning Solutions Director at Global Learning Systems will discuss:
• Key components of a security culture
• Practical steps for maturing your security culture and tailoring it to your organization
• The characteristics of a security-minded employee
• Metrics for measuring culture in your organization
• Maintaining the security mindset in and out of the office

To watch the webinar recording, please provide:

*
*
*
*
*
*
*
GLS Logo
Front-End Exercises
React Angular Vue.js
Cross Site Request Forgery Cross Site Request Forgery Untrusted HTML Rendering XSS
Direct Dom Manipulation XSS Direct Dom Manipulation XSS Direct Dom Manipulation XSS
Components with Known Vulnerabilities Template Concatenation Cross Site Request Forgery
Untrusted HTML Rendering XSS Sanitization Misuse XSS Untrusted Template Usage XSS
GLS Logo
OWASP Top 10 – API – 2019
ID Topic Covered in SecureDev Modules Programming Languages Available
API1:2019 Broken Object Level Authorization Broken Object Level Authorization JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
API2:2019 Broken User Authentication Broken User Authentication
API3:2019 Excessive Data Exposure Excessive Data Exposure
API4:2019 Lack of Resources & Rate Limiting Lack of Resources & Rate Limiting
API5:2019 Broken Function Level Authorization Broken Function Level Authorization
API6:2019 Mass Assignment Mass Assignment
API7:2019 Security Misconfiguration Security Misconfiguration
API8:2019 Injection Injection
API9:2019 Improper Assets Management Improper Assets Management
API10:2019 Insufficient Logging & Monitoring Insufficient Logging & Monitoring
GLS Logo
OWASP Top 10 – 2021
ID Topic Covered in SecureDev Modules Programming Languages Available
A01:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
A02:2021 Cryptographic Failures Weak Randomness
A03:2021 Injection SQL Injection Command Injection Header Injection XML Injection
A04:2021 Insecure Design User Enumeration
A05:2021 Security Misconfiguration Leftover Debug Code
A06:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation
A07:2021 Vulnerable and Outdated Components Session Fixation Forced Browsing
A08:2021 Software and Data Integrity Failures Reflected XSS
Forced Browsing
Stored Cross-Site Scripting
Insecure URL Redirect
Clickjacking
Directory Traversal
DOM XSS
Cross-site Request Forgery
A09:2021 Security Logging and Monitoring Failures PII Data in URL
Token Exposure in URL
A10:2021 Server-Side Request Forgery (SSRF) Server-Side Request Forgery
GLS Logo

Your download is complete!

Need more training?