What You Need to Know Before
You Start
Starts 8 June 2025 02:11
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
Sure, Let Business Users Build Their Own. What Could Go Wrong?
Explore the risks and security implications of business users creating applications with low-code/no-code platforms, and learn strategies to mitigate potential vulnerabilities in enterprise environments.
Black Hat
via YouTube
Black Hat
2544 Courses
44 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore the risks and security implications of business users creating applications with low-code/no-code platforms, and learn strategies to mitigate potential vulnerabilities in enterprise environments.
Syllabus
- Introduction to Low-Code/No-Code Platforms
- Risks Associated with Low-Code/No-Code Development
- Case Studies of Security Incidents
- Understanding Security Implications
- Mitigation Strategies for Enterprises
- Best Practices for Business Users
- Tools and Technologies for Risk Mitigation
- Building a Security-Focused Culture
- Future Trends and Challenges
- Course Wrap-Up and Assessment
Overview of low-code/no-code platforms
Benefits and appeal to business users
Common platforms in the market
Security vulnerabilities in low-code applications
Data privacy concerns
Compliance and regulatory issues
Real-world examples of low-code risks
Analysis of causes and consequences
Lessons learned from each case
Common security threats in low-code environments
Identifying weaknesses in user-created applications
Security-by-design principles
Establishing governance frameworks
Implementing security protocols and guidelines
Role of IT departments in oversight and support
Educating users on secure development practices
Encouraging collaboration with IT professionals
Continuous monitoring and updates
Security tools compatible with low-code platforms
Automated security testing solutions
Role of AI in enhancing application security
Fostering a security-first mindset among users
Creating feedback loops for continuous improvement
Importance of cross-departmental collaboration
Emerging threats in the low-code ecosphere
The evolving role of business users in tech development
Predictions for low-code/no-code security advancements
Recap of key lessons learned
Self-assessment quizzes and feedback
Resources for further learning and development
Subjects
Conference Talks