Friday, 14. October 2022., 10:25
Do you know that half of the cyberattacks are never detected?Can you tell if your APEX application is secured? We CAN!Do you know why? Because we included in the development lifecycle a process to check vulnerabilities and verify the security of our APEX application. This process can and should be included into your development process as well.In this session we’ll discuss the type of security risks an APEX application can expose, and how our team is doing the evaluation of these risks. You will find out about the free tools, paid tools and do-it-yourself tools you can use to verify the vulnerability of the system during the development process or gather information on a running system to identify intruders.The session is inspired by security-check processes we are using in a few projects. It covers technical details as well as project planning, and it is addressed to developers, team leaders, and project managers.