Your second best option: achieve security through a downstream pentest. It would be better to plan and design a software product securely from the outset with Security & Privacy by Design. Aspects of secure operation must be taken into account in the design and a secure architecture must also be implemented securely.
Use concrete examples to learn how these topics are related in SecDevOps and can be addressed in a secure software lifecycle. Experience our experts for architecture, development and operations as they examine the critical questions from all three perspectives.
This will help you learn a sensible approach for existing or future software projects.
The lecture will be given by Rico Komenda, Vincent Dahmen and Fatih Mehel.
< ...