Can a hacker exploit your Elixir application and cause a data breach? This is an important question for every organization using Elixir in production today. This talk will cover:
- The context of how Elixir fits into the overall cyber security strategy of an organization.
- How attackers approach Elixir applications, and the most important defenses that need to be in place.
- How to prioritize security work. The amount of material in cyber security can feel overwhelming. This talk will provide a detailed, prioritized list of how to allocate engineering time.
Elixir is an excellent choice for writing secure applications. Learn how to take advantage of the solid foundation it provides to create secure systems.