Content tagged as 'Operational-Efficiencies'

Here is a list of all the content that has been tagged as operational-efficiencies.

Development Team Security Teardown $995NZ + GST

We can provide insight into potential issues/defects that are not obvious with your Development Team(s):
• Development Process
• System Being Developed
Our Teardown can provide the needed visibility in order to make the improvements.

Workshop - Building Security Into Your Development Teams

Kim’s flagship Software Developer focussed training, this time at OWASP New Zealand Day conference.

Development Team Security Roadmap $2995NZ + GST

Too many security defects in your Development Team(s) deliverables?
External security reviews too costly?

Let us create a security roadmap for your Development Team(s).

Security Strategy Retainer $3495NZ + GST

Our agreement entitles you to unlimited 1 on 1 access to Kim via phone, SMS, email, Slack, Skype, Signal, etc. Participation is limited to 10 people. Fee is for four months.

Building Security into Your Development Teams (workshop) $495 + GST per student

Full Day Interactive Workshop focussing on building security into your Development Team(s).

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises.

Workshop - Building Security Into Your Development Teams

Kim’s flagship Software Developer focussed training, this time at Christchurch Hacker Conference (CHCon).

Francois Raynaud on DevSecOps

Francois Raynaud and Kim Carter discuss what’s wrong with the traditional delivery approach and why we need to change. On Software Engineering Radio.

Talk - The Art of Exploitation

At JS Remote Conf: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.

Talk - The Art of Exploitation

At NZ.JS: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.