Slack’s approach to security Video Player is loading.Play VideoPauseUnmuteCurrent Time 0:01/Duration 31:32Loaded: 0.83%00:02Stream Type LIVESeek to live, currently behind liveLIVERemaining Time -31:31 1xPlayback RateChaptersChaptersDescriptionsdescriptions off, selectedCaptionscaptions settings, opens captions settings dialogcaptions off, selectedAudio TrackPicture-in-PictureFullscreenThis is a modal window.Beginning of dialog window. Escape will cancel and close the window.TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaqueFont Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall CapsReset restore all settings to the default valuesDoneClose Modal DialogEnd of dialog window. IntroductionOrganizational securityPersonnel securitySecurity and privacy trainingPolicies and standardsAudits, compliance, and 3 rd party assessmentsAuditsPenetration testingLegal complianceData requestsSecure by designSDLBug bountyProtecting customer dataData encryption in transit and at restNetwork securityClassifying and inventorying dataAuthorizing accessAuthenticationSystem monitoring, logging, and alertingEndpoint monitoringMobile device managementData and media disposalProtecting secretsWorkstation securityControlling system operations and continuous deployment.Controlling changePrevention and detection of malicious codeServer hardeningFile change managementDisaster recovery and business continuity3rd party suppliersConclusionContact us