Transcript
            
            
              This transcript was autogenerated. To make changes, submit a PR.
            
            
            
            
              Hello, everybody.
            
            
            
              How you doing?
            
            
            
              My name is Victor.
            
            
            
              And today in this particular course today, I'll be teaching
            
            
            
              you about, a course, a topic.
            
            
            
              I'm talking about a topic called beyond the code, building cyber
            
            
            
              security awareness in your platform development team.
            
            
            
              So if you are looking to inculcate the best practices into your platform
            
            
            
              development teams, this particular talk, you would actually find useful.
            
            
            
              By the end of this talk, you should be able to understand some modern
            
            
            
              threats that your team actually faces as a platform development
            
            
            
              team and how to elevate your security mindset in your team.
            
            
            
              So it's important for us to understand that, the cybersecurity
            
            
            
              landscape is evolving just to where.
            
            
            
              We with more, improvement in technology, there's also going to be improvements
            
            
            
              in security threats, so there's a rise of sophisticated threats and
            
            
            
              the attack vectors, improving attack vectors here simply means, the
            
            
            
              means through the channels through which you can actually be attacked.
            
            
            
              So for instance, things like IOT systems, for instance, You can actually be hacked
            
            
            
              through your cameras or maybe your fridge because fridge freezers and fridges today
            
            
            
              have I have like I like IoT devices too.
            
            
            
              They can actually be.
            
            
            
              Connected to via the Internet, and there's also an increasing
            
            
            
              reliance on technology today.
            
            
            
              Lots of organizations, almost everybody in the world CrowdStrike
            
            
            
              event where because of there was a downtime with the CrowdStrike system,
            
            
            
              airports were shut, airports could not, their operations were affected.
            
            
            
              In the world today, technology is like the backbone of most
            
            
            
              of the business processes.
            
            
            
              yeah, so the first thing to actually look at when you're talking about
            
            
            
              integration security into your platform development lifecycle is
            
            
            
              to have a secure by design mindset.
            
            
            
              What it means here for the shift approach means the fact that, you Make sure that
            
            
            
              whatever you do when you arrive with your designs, maybe you are designing
            
            
            
              a cloud application or a software.
            
            
            
              For instance, you want to make sure that it is secure by design, meaning
            
            
            
              that you consider security first.
            
            
            
              It doesn't matter how fancy whatever your building is.
            
            
            
              If it's not secure, it can actually be an attack vector through which
            
            
            
              your system is going to be attacked.
            
            
            
              There should also be a secure testing and analysis piece.
            
            
            
              What this means is that you should have a very good quality assurance process in
            
            
            
              place in your platform development team.
            
            
            
              you shouldn't be in a hurry to move a product into a, an app or a
            
            
            
              software into the production system.
            
            
            
              Without adequately testing it, you should have a very good quality
            
            
            
              assurance system or methodology.
            
            
            
              And there are also automated security tools you can
            
            
            
              actually use to achieve this.
            
            
            
              And there are also different methodologies.
            
            
            
              You can actually also make sure you do penetration testing.
            
            
            
              Penetration testing means that you actually get maybe a hacker to, you
            
            
            
              get a hacker to actually target your system to see how, where and where
            
            
            
              your system could be vulnerable.
            
            
            
              I could also.
            
            
            
              Do things around statistics, code and statistics, static code analysis where
            
            
            
              you can actually review the source code or what you do to actually see whether
            
            
            
              there are any bugs where, for instance, if there are any bugs that could actually
            
            
            
              make you prone to being attacked via SQL injection attack, for instance, those will
            
            
            
              be identified with a static code analysis.
            
            
            
              Process.
            
            
            
              it's also very important to you.
            
            
            
              That's what you're looking to have a security conscious culture.
            
            
            
              They should be regular awareness trainings held in your organization, and
            
            
            
              they should openness and transparency.
            
            
            
              What this actually means is the fact that your team should be people
            
            
            
              should be encouraged to, speak up when they feel something is wrong.
            
            
            
              Okay, you should encourage an atmosphere of people speaking up,
            
            
            
              people not keeping to themselves when they feel something is wrong.
            
            
            
              It could be the difference between you being cyber safe
            
            
            
              and you being cyber attacked.
            
            
            
              Okay, so it's very important to encourage a community and ambience of.
            
            
            
              Open transparency is very important for you to maintain security
            
            
            
              conscious culture within your team.
            
            
            
              incentives could also be provided to members of your team when a member of
            
            
            
              your team, actually does an achievement or is actually like a cyberspace champion
            
            
            
              in the sense that he or she encourages, The team needs to be more cyber a lot.
            
            
            
              you could actually sign our words for those kind of people and give them
            
            
            
              our words or maybe monetary gift of our chance to encourage them so that
            
            
            
              all the members of the team see that good behavior is actually encouraged.
            
            
            
              Going back to the secrecy awareness training.
            
            
            
              This is a lot actually been found that most companies are
            
            
            
              not doing a lot to, train.
            
            
            
              They're not doing a lot to actually train, their staffs regularly around, Cyber
            
            
            
              security trainings and cyber security trains, so it's not just enough for you
            
            
            
              to organize a cyber security training.
            
            
            
              When you're onboarding your staff, you should also make sure
            
            
            
              that it's a question of process.
            
            
            
              They should understand the importance of things around not having a cladex policy.
            
            
            
              they should have a cladex policy, things around changing their passwords regularly,
            
            
            
              things around not sharing, things Sensitive, office things when they're
            
            
            
              personal social media, things like that.
            
            
            
              Those are reminders, nudging your staffs to make sure that they don't become
            
            
            
              like an attack vector themselves with moving towards social engineering.
            
            
            
              And so in social engineering concepts, your staffs may actually be an attack
            
            
            
              vector that you could be hacked from.
            
            
            
              So you have to be very careful, You should also look at implementing secure
            
            
            
              coding practice on the technical area.
            
            
            
              We talk about things around form validation.
            
            
            
              For instance, I spoke about password for the previous slide.
            
            
            
              when it comes to things around input validation, you should say, if you have
            
            
            
              some sensitive files, For instance, you could also secure it to the way that
            
            
            
              the password to access those files would have certain rules and requirements.
            
            
            
              For instance, it could be that the password must be maybe 15 characters long.
            
            
            
              where you must have a capital letter, small letter symbols and all that.
            
            
            
              So there must be, good input validation built into your system.
            
            
            
              There should also be secure authentication and authorization systems, things
            
            
            
              around MFA, multi factor authentication, to make sure that the person who
            
            
            
              is logging in or having access to sensitive documents, Is supposed to
            
            
            
              be the person having access to them.
            
            
            
              Okay.
            
            
            
              So this is very important to know.
            
            
            
              Then also encryption, it goes without saying, it cannot be overemphasized
            
            
            
              and it cannot be understated that you need to encrypt sensitive files.
            
            
            
              Oh, look at the CIA triad.
            
            
            
              Things around your confidentiality, your integrity of your files is so important.
            
            
            
              So sensitive details like passwords or, system like systems in your,
            
            
            
              In your disposals, you should make sure that you also inculcate things
            
            
            
              around the least privileged access methodologies where anyone who shouldn't
            
            
            
              have any business having access to a system should not have access to it.
            
            
            
              It should be encrypted from them.
            
            
            
              It's only individuals who would have, who, who, Authorized to have access
            
            
            
              to the information who, you can use, you can say something like around a
            
            
            
              need to know basis, something around a need to know basis where it is only
            
            
            
              when they have to know that it would actually have access to actually decrypt
            
            
            
              that file and have access to the file.
            
            
            
              So encryption is very important.
            
            
            
              The number four would be secure logging and monitoring.
            
            
            
              This is so important, very important.
            
            
            
              You need to have a secure logging system that shows who actually logged,
            
            
            
              who actually accessed the resource.
            
            
            
              And when did they access the resource?
            
            
            
              It cannot be overemphasized.
            
            
            
              When you have a cyber attack and you are doing a post incident recovery, you
            
            
            
              want to go back and check, actually, let's be cyber attack who accesses
            
            
            
              file who was killing through this file.
            
            
            
              It will help you investigate.
            
            
            
              So there's a need to have a secure logging system that shows that tracks the time
            
            
            
              and whatever anybody did in a system.
            
            
            
              Some organizational systems around them use different softwares
            
            
            
              to actually track this down.
            
            
            
              So you need to check for a software that actually works for you to project.
            
            
            
              Then if your physical security of your platforms, things around your,
            
            
            
              network security and segmentation, implementing a firewall is non negotiable.
            
            
            
              You will need to have interaction systems, your QALYs, QBM IRADAR, QALYs, DACTRACE.
            
            
            
              Different options for you to use from Microsoft Defender.
            
            
            
              you should also implement firewalls outside and inside
            
            
            
              your network if need be.
            
            
            
              You can also, for some organizations, I know some , your
            
            
            
              staff probably work remote.
            
            
            
              You probably want get a VAN establish a site end to in v you secure v and VPN
            
            
            
              system to ensure that there's enough, there's a very good segmentation.
            
            
            
              That helps your remote workers connect securely to your network,
            
            
            
              in such a way that it does not affect your main usnc files.
            
            
            
              Okay.
            
            
            
              So that is what's network security and segmentation will help you do.
            
            
            
              Then best practices.
            
            
            
              You need to have best practices.
            
            
            
              I've spoken about that in the previous slide.
            
            
            
              You even must have a good access, I didn't say an access management
            
            
            
              system that talks about your authorization, access and authorization.
            
            
            
              people who are logging into your systems must have the right
            
            
            
              login credentials to do Okay.
            
            
            
              If you log in, if your login process is broken, you might as well know
            
            
            
              that your systems are not safe.
            
            
            
              Okay.
            
            
            
              And you should also have to do regular scanning so that where
            
            
            
              and where you are actually weak.
            
            
            
              It's a good practice to have penetration testers come to test your systems
            
            
            
              regularly to know where you are weak.
            
            
            
              So you can do that maybe every three months to check, okay, get a penetration
            
            
            
              test that will actually test your system.
            
            
            
              Physical security measures since around Creating barriers to your systems.
            
            
            
              you should have guts in your data sentence.
            
            
            
              if you have data centers, if you're filed on August 10 on the cloud and
            
            
            
              you have some offline files stored in data centers, you should have fiscal
            
            
            
              gaps, fiscal barriers, surveillance systems, cameras, to protect access
            
            
            
              to your, your critical infrastructure.
            
            
            
              Very important to have all those in place, and of course you should have an
            
            
            
              adequate backup, adequate backup measure in place just in case maybe there's a
            
            
            
              fire, so that your systems are not lost.
            
            
            
              Make sure you back up your systems properly.
            
            
            
              Incident response planning cannot be overemphasized.
            
            
            
              you should have In your security policy organization, there should
            
            
            
              be, a comprehensive incidents response plan as regards, the
            
            
            
              procedures for containing any security incidents you might actually have.
            
            
            
              You should have a dedicated team, maybe outsource dedicated team that would be,
            
            
            
              Taxed with the responsibility of handling any incident you might probably encounter
            
            
            
              in the course of your day to day work.
            
            
            
              Okay.
            
            
            
              And of course, there are software that could actually help you with
            
            
            
              threat intelligence and analysis.
            
            
            
              I've mentioned some like DuckTrace and IBM Curator.
            
            
            
              There are lots of them, but you need to work with what works for your budget.
            
            
            
              Okay.
            
            
            
              So incident resource plan, you should have an incident resource
            
            
            
              plan in your security policy.
            
            
            
              that shows the appropriate response, how you are going to actually deal
            
            
            
              with the incident, how you are going to do it during the incident and
            
            
            
              after the incident, what steps will be taken so that you don't fall to
            
            
            
              that same server attack next time.
            
            
            
              Very important.
            
            
            
              yes.
            
            
            
              So There's a need for continuous monitoring, you have to continuously
            
            
            
              monitor your systems, you have to continue to monitor them because the
            
            
            
              cyber attackers are not actually sleeping, so you have to continuously check.
            
            
            
              Though some systems will give you false positives, some softwares
            
            
            
              like, I know Qualys and some other systems, sometimes they may throw
            
            
            
              what they call false positives.
            
            
            
              which might not actually be a cyber threat.
            
            
            
              you want to make sure that you check very well, you investigate for that, you check
            
            
            
              the logs and check that, okay, this system is actually, this is actually not actually
            
            
            
              a false policy, but if you see anything unusual in your monitoring and your
            
            
            
              vulnerability assessment, you raise it up to your line manager to let them know
            
            
            
              what to do so that they can take it up and actually neutralize any cyber threat.
            
            
            
              lastly, I would, I want to talk about Empowering your team.
            
            
            
              It's so important for you to take security awareness training seriously.
            
            
            
              it is very important to work on a mindset of your team.
            
            
            
              They need to understand that cyber security is everybody's business, not
            
            
            
              just the security team's business.
            
            
            
              Everybody should be cyber aware.
            
            
            
              Very important.
            
            
            
              That's why I mentioned you need to train them.
            
            
            
              You need to train your staff.
            
            
            
              Regularly around security because he has different security threats
            
            
            
              coming up every day and your system, your staffs need to be aware.
            
            
            
              They should also be.
            
            
            
              you can also have things around threat modeling in the
            
            
            
              interactive security simulations.
            
            
            
              You can actually do security simulation where you check You know, you mimic real
            
            
            
              world scenarios to help people at it.
            
            
            
              So that would help you identify how you're going to respond to a threat.
            
            
            
              You can also, when it comes to security awareness and training, you can also
            
            
            
              conduct fun games, security games, that can actually, you can give me
            
            
            
              five security scenarios, true quizzes, interactive games, challenges, and
            
            
            
              why your staffs are having fun.
            
            
            
              They'll be learning things about security.
            
            
            
              Okay.
            
            
            
              Just to make them have fun and they will have that mindset, within them that.
            
            
            
              Okay.
            
            
            
              We have actually, we need to be actually be cyber secure and we need to have
            
            
            
              informed, actually learning something.
            
            
            
              And with that, you are improving, you are empowering, the security mindset.
            
            
            
              And in conclusion, I just want to say that it is very possible for you to actually
            
            
            
              cultivate a security conscious culture within your platform development team and
            
            
            
              protect your platform development team from modern threats so that you can have a
            
            
            
              resilient cyber posture in your platform.
            
            
            
              in your organization.
            
            
            
              So you need to take this seriously.
            
            
            
              And if you aren't doing any of the things listed in this presentation
            
            
            
              before, please take out time.
            
            
            
              You can speak to a cybersecurity consultant about it.
            
            
            
              And I actually hope and believe that, you will find you have
            
            
            
              found this presentation useful.
            
            
            
              And, yes, so it is very, I find I, I counted the privilege to actually
            
            
            
              present in conf platform and the conf.
            
            
            
              42 plus from engineering 2024 program.
            
            
            
              And I'm sure that you would, you've actually found this pretty useful and yes.
            
            
            
              So I guess I'll catch up with you another time and wherever you are in the world,
            
            
            
              I want to say, have an amazing time.
            
            
            
              Thank you very much for listening.