Slack’s approach to security Video Player is loading.Play VideoPauseSkip BackwardSkip ForwardUnmuteCurrent Time 0:03/Duration 31:32Loaded: 1.06%00:03Stream Type LIVESeek to live, currently behind liveLIVERemaining Time -31:29 1xPlayback RateChaptersChaptersDescriptionsdescriptions off, selectedCaptionscaptions settings, opens captions settings dialogcaptions off, selectedAudio TrackPicture-in-PictureFullscreenThis is a modal window.Beginning of dialog window. Escape will cancel and close the window.TextColorWhiteBlackRedGreenBlueYellowMagentaCyanOpacityOpaqueSemi-TransparentText BackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanOpacityOpaqueSemi-TransparentTransparentCaption Area BackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanOpacityTransparentSemi-TransparentOpaqueFont Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDrop shadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall CapsResetDoneClose Modal DialogEnd of dialog window. IntroductionOrganizational securityPersonnel securitySecurity and privacy trainingPolicies and standardsAudits, compliance, and 3 rd party assessmentsAuditsPenetration testingLegal complianceData requestsSecure by designSDLBug bountyProtecting customer dataData encryption in transit and at restNetwork securityClassifying and inventorying dataAuthorizing accessAuthenticationSystem monitoring, logging, and alertingEndpoint monitoringMobile device managementData and media disposalProtecting secretsWorkstation securityControlling system operations and continuous deployment.Controlling changePrevention and detection of malicious codeServer hardeningFile change managementDisaster recovery and business continuity3rd party suppliersConclusionContact us