DevSecCon Presentation

Avoiding insidious points of compromise in infrastructure access systems