У нас вы можете посмотреть бесплатно What Salesforce Teams Need to Do in the First 24 Hours After a Data Breach или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
What do you do in the first 24 hours after a Salesforce data breach? In this Salesforce Security Office Hours session, Matt Myers, Salesforce CTA and CoFounder and CEO of EzProtect, walks through the NIST Threat Response Lifecycle applied to Salesforce — from detection and containment to recovery and validation. Most teams don't have a plan. Learn why password resets don't revoke OAuth tokens, how to assess blast radius across connected apps, and why your metadata needs the same scrutiny as your data after a breach. Plus, a breakdown of the Scattered Spider phishing campaign currently bypassing MFA at 100+ global organizations. ➡️ Download the official guide to protect your data from hackers in Salesforce https://ezprotect.io/platform/ Timecodes 0:00 Welcome 5:43 Is Your Org Ready for the First 24 Hours? 6:33 What is Salesforce Security Office Hours 8:22 Meet Matt Myers 8:50 About EzProtect 9:52 Recap: Shift Left Security with Mala Punyani 11:14 Hot Off the Press: Scattered Spider Phishing 100+ Orgs 13:15 Hardware Authentication vs MFA Code Theft 15:11 Why Most Salesforce Teams Are Not Ready 16:04 The NIST Threat Response Lifecycle 17:47 204 Days: The Detection Gap 19:11 OAuth Tokens Bypass MFA and Password Resets 20:13 Detection and Assessment 22:05 Why Forced Password Rotation Can Backfire 22:46 Assessing the Blast Radius 24:12 Containment: Stop the Bleeding 25:15 Password Resets Don't Revoke OAuth Tokens 25:58 Building Your Firefighting Team 26:16 Recovery: Rebuilding After the Breach 27:18 Check Metadata, Not Just Data 27:59 Lessons Learned and Validation 29:39 Token Rotation Policies 30:17 Test, Test, Test 32:12 Live: Steven Audits His Connected Apps 35:55 Spring '26: No More New Connected Apps 36:55 Questions Every Org Should Be Asking 41:10 Q&A: Developer Sandbox Security 44:53 Q&A: Session ID Capture in Visualforce 47:14 Q&A: Data Masking and Transaction Security 48:54 Q&A: Where to Start as a Salesforce Manager 51:49 Future Topic: Transaction Security Policies 57:44 Closing 🔔 Subscribe to EzProtect - For Salesforce Best Practices here / @mattmeyers-cta 📚Learn More About Virus Scanning in Salesforce ➡️ https://www.ezprotect.io 📚Learn Common Virus Scanning Myths in Salesforce https://ezp.fyi/3NeZY48 📆 Book a time to talk with us https://ezprotect.io/schedule ----------------SOCIAL--------------- ✅ Twitter: / ezprotect ✅ Instagram: / ezprotect.co ✅ LinkedIN: / matt-meyers-cta