← All talks

Token Rotation: Essential Security & Leadership Insights #shorts

BSides Frankfurt0:30393 viewsPublished 2026-04Watch on YouTube ↗
About this talk
Did a leaked token get abused? Audit logs are key to finding out. If evidence of abuse exists, immediate rotation is critical. This requires strong leadership. #Security #Cybersecurity #TokenRotation #Leadership
Show transcript [en]

We have to We have to go through all the work to rotate that token. And the engineers and everybody's like, "Man, it wasn't really leaked." No, yes, it was. And if you have all the audit logs, you can go in and prove like, "Okay, this was leaked on this date. We see zero evidence it was ever abused. Okay, fine, it's not a critical emergency, but it's got to be rotated in the next 2 weeks." Um but if you find evidence it has been abused, you need to rotate it now. And that takes leadership by and large.