We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

FOSS and Security Risk Management

00:00

Formal Metadata

Title
FOSS and Security Risk Management
Title of Series
Number of Parts
43
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Recent and ongoing EU legislation concerning data protection, product and service security fundamentally change how insecurity is supposed to be dealt with. For FOSS, managing security risks is crucial, and this talk is examining its intersection with these recent legal changes. The talk will focus on practical approaches, strategies and frameworks for assessing, prioritizing, and mitigating security risks. Whether you're a FOSS enthusiast, developer, or security professional, this talk provides valuable insights into safeguarding FOSS use within a shifting regulatory landscape.
Data managementMusical ensemblePresentation of a groupInformation securityBitSoftware testingData managementComputer animationXMLLecture/ConferenceMeeting/Interview
Scaling (geometry)Lecture/Conference
Software maintenanceCollaborationismSoftwareSource codePresentation of a groupDigital signalInformation securityFocus (optics)Process (computing)Self-organizationInformationVector potentialOperations researchChainRepository (publishing)Sigma-algebraExpert systemType theoryBitRegulator genePhysical systemINTEGRALSoftware developerSoftwareInformation securitySystem administratorInternet forumDifferent (Kate Ryan album)Dependent and independent variablesIncidence algebraInheritance (object-oriented programming)Group actionProcess (computing)Revision controlOpen sourceProjective planeSpacetimeSource codeSelf-organizationSystem identificationTelecommunicationContext awarenessMetric systemTrailAuthorizationRankingMereologyOrder (biology)Software maintenanceTerm (mathematics)Repository (publishing)2 (number)Library (computing)Sign (mathematics)Extreme programmingMoment (mathematics)Data managementVideo gameChainMathematicsLevel (video gaming)NeuroinformatikVulnerability (computing)CybersexConnectivity (graph theory)PlastikkarteMultiplication signOpen setBuildingSoftware repositoryCodeComputer animation
Information securityBuildingSource codeCodeGroup actionLine (geometry)Token ringSoftware repositoryAuthenticationSuite (music)Installation artRepository (publishing)Feasibility studyControl flowSoftware maintenanceBranch (computer science)File viewerFile formatQuery languagePerspective (visual)Projective plane1 (number)Musical ensembleInformation securityMereologyNumberToken ringPersonal identification numberBinary codeBitBranch (computer science)Revision controlRepository (publishing)Hash functionProcess (computing)Software testingComputer fileNumbering schemeType theoryEndliche Modelltheorie4 (number)Software maintenanceExpressionPatch (Unix)Analytic continuationInterface (computing)Moment (mathematics)Web 2.0File viewerReverse engineeringVulnerability (computing)Visualization (computer graphics)CASE <Informatik>Software developerTerm (mathematics)FlagMultiplication signSurfaceCore dumpDifferential (mechanical device)Order (biology)SoftwareWindowCodeGroup actionLikelihood functionHecke operatorLatent heatBuildingCircleRepresentational state transferLine (geometry)Uniform resource locatorLetterpress printingComputer animation
Musical ensembleWeb 2.0Cartesian coordinate systemWeb applicationComputer animation
Cloud computingView (database)Repository (publishing)ChainBlogToken ringBuildingSource codeInformation securityCodeDisintegrationError messageBounded variationBinary fileBranch (computer science)Game theoryInternetworkingMultiplication signComputer animation
ExplosionTorusPort scannerProjective planeMathematicsLibrary (computing)Electronic mailing listLecture/Conference
ExplosionVertex (graph theory)Streaming mediaVirtual machineLink (knot theory)Repository (publishing)Information securityWebsiteSoftware frameworkBinary fileSoftwareComputer-generated imageryGraph (mathematics)DatabaseChainOpen sourceAreaSeries (mathematics)Event horizonLattice (order)Distribution (mathematics)Point (geometry)Internet forumSystem administratorSource codeSoftware developerIntegral domainSpring (hydrology)Cloud computingElectronic signatureSet (mathematics)Moment (mathematics)Beta functionVulnerability (computing)Library (computing)PlastikkarteBitNeuroinformatikProjective planeInformation securityGroup actionBuildingGraph (mathematics)SoftwareCycle (graph theory)Event horizonElectronic mailing listLevel (video gaming)Open sourceSoftware maintenanceType theoryComputing platformBookmark (World Wide Web)Form (programming)Computer animation
Lattice (order)Electronic mailing listPlastikkarteWebsiteChainElectronic data interchangeRegulator geneWeb pageElectronic mailing listMultiplication signComputer animationLecture/Conference
Presentation of a groupSoftware frameworkHypermediaDigital signalTerm (mathematics)Electronic mailing listTerm (mathematics)Source codeInformation securityRegulator geneType theoryComputer animation
Presentation of a groupConnected spaceTable (information)Computer animation
CAN busSanitary sewerGamma functionMusical ensembleLecture/Conference
Transcript: English(auto-generated)