What You Need to Know Before
You Start

Starts 8 June 2025 02:11

Ends 8 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Sure, Let Business Users Build Their Own. What Could Go Wrong?

Explore the risks and security implications of business users creating applications with low-code/no-code platforms, and learn strategies to mitigate potential vulnerabilities in enterprise environments.
Black Hat via YouTube

Black Hat

2544 Courses


44 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore the risks and security implications of business users creating applications with low-code/no-code platforms, and learn strategies to mitigate potential vulnerabilities in enterprise environments.

Syllabus

  • Introduction to Low-Code/No-Code Platforms
  • Overview of low-code/no-code platforms
    Benefits and appeal to business users
    Common platforms in the market
  • Risks Associated with Low-Code/No-Code Development
  • Security vulnerabilities in low-code applications
    Data privacy concerns
    Compliance and regulatory issues
  • Case Studies of Security Incidents
  • Real-world examples of low-code risks
    Analysis of causes and consequences
    Lessons learned from each case
  • Understanding Security Implications
  • Common security threats in low-code environments
    Identifying weaknesses in user-created applications
    Security-by-design principles
  • Mitigation Strategies for Enterprises
  • Establishing governance frameworks
    Implementing security protocols and guidelines
    Role of IT departments in oversight and support
  • Best Practices for Business Users
  • Educating users on secure development practices
    Encouraging collaboration with IT professionals
    Continuous monitoring and updates
  • Tools and Technologies for Risk Mitigation
  • Security tools compatible with low-code platforms
    Automated security testing solutions
    Role of AI in enhancing application security
  • Building a Security-Focused Culture
  • Fostering a security-first mindset among users
    Creating feedback loops for continuous improvement
    Importance of cross-departmental collaboration
  • Future Trends and Challenges
  • Emerging threats in the low-code ecosphere
    The evolving role of business users in tech development
    Predictions for low-code/no-code security advancements
  • Course Wrap-Up and Assessment
  • Recap of key lessons learned
    Self-assessment quizzes and feedback
    Resources for further learning and development

Subjects

Conference Talks