|Join hundreds of other Developers and InfoSec professionals for Training, Sessions and Community at our first conference of 2019|
[AppSec Tel Aviv, May 26-30th]
Compliance driven vulnerabilities
Fingerprinting and enumeration techniques help plan security assessments, but knowledge of the compliance requirements can also provide an insight into the application. If the compliance requirements are fully considered at earlier stages in the software development lifecycle, the implications for security can be addressed reducing design changes later on. These topics are explored with reference to legislative, regulatory and other mandates including the Web Content Accessibility Guidelines (WCAG) 2.0 which covers a wide range of recommendations for making Web content more accessible.
He holds an MSc in Computation from the University of Oxford and is a member of OWASP's Global Industry Committee. Colin is the technical director and principal consultant at web security consultancy Watson Hall Ltd in the United Kingdom. He has a particular interest in creating user trust and the relationship between security and usability.