As cybersecurity professionals, we have a responsibility to understand the value properly applied inheritable controls can bring to modern outcomes.
When we consider how cybersecurity compliance fits into modern development strategies such as Agile, the role of inheritable controls as the unsung heroes of an effective cybersecurity infrastructure becomes increasingly evident. The risk with this approach is a lack of understanding of how (and whether) the control provides the promised mitigation, especially in assuming the boundaries of ownership, which can lead to the introduction of cyber vulnerabilities that could have been avoided.
This Breakout Session includes:
* A better understanding of how inheritable controls reduce toil and increase development efficiency. * How to align inheritable controls’ value with stakeholder outcomes. * How to effectively manage inheritable controls.
Learning Objectives:
Understand how to shift your perspective and that of your teams to better understand how inherited controls reduce toil and increase development efficiency.
Answer the question, "How can we ensure that the values of inheritable controls align with stakeholders' desired outcomes?"
Demonstrate how to effectively document and manage inheritable controls. (Spoiler: they aren't just something you add to a spreadsheet).