DiscoverFuture of Application Security
Future of Application Security
Claim Ownership

Future of Application Security

Author: Tromzo

Subscribed: 9Played: 107
Share

Description

The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources.

What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR).

Download our new MTTR guide: https://lnkd.in/evjcf4Vt
60 Episodes
Reverse
In this episode of the Future of Application Security podcast, Harshil speaks with Abdullah Munawar, Director of Product Security at Appian. Abdullah shares valuable insights into his journey from security assessments and consulting to leading product security efforts, discussing the evolving challenges and strategies for building effective security programs in modern development environments.  He discussed the importance of evolving security practices beyond identification to implementation within organizations, including the need for a holistic approach to product security and focusing on high-priority vulnerabilities. Abdullah also explains the challenges of maintaining data quality in AI companies.  Topics discussed: The transition from consulting to in-house product security and the importance of hands-on experience in understanding the challenges of implementing security fixes and mechanisms. Defining the scope of product security in the context of decentralized development practices and the shift towards "you build it, you manage it" approaches. The changing role and structure of product security teams to address the full stack of security concerns, from architecture and automation to traditional AppSec tasks. Strategies for driving remediation and adoption of security practices, including leadership buy-in, targeted automation, and empathy-building initiatives like security champion programs. Emerging challenges in product security related to AI and data management, such as data poisoning, segregation, and unintended leakage.
In our latest episode of the Future of Application Security podcast, Nat Mokry, VP of Application & Product Security at Xbox (formerly of Activision Blizzard at the time of recording), shares valuable insights into the world of application security, from the mission of defending player trust to emphasizing the importance of technical skills in cybersecurity.  Nat provides guidance on building effective security teams and navigating the evolving challenges in the industry. Topics discussed: Earning and defending player trust as a guiding principle of business and strategies for making mission statements actionable. Building and structuring a diverse security team, and the challenges faced by appsec teams in the current landscape. The concept of the "piggy bank of trust" in security relationships that Nat says helps him and his team remember that people skills are important too. Balancing technical expertise and security knowledge, depending on what your data is telling you.  Having the humility to ask questions and not have all the answers. The difference between solving problems for people and minimizing the chances of them doing something wrong. 
In this episode of the Future of Application Security podcast, Harshil interviews Felix Matenaar, Head of Product Security at Asana. Felix shares insights into his journey from Germany to Silicon Valley, where he transitioned from mobile security to leading Asana's product security efforts. The conversation highlights Felix's experience in creating security frameworks that eliminate vulnerabilities by building secure product lifecycles and ensuring alignment with business objectives. His approach integrates rigorous security measures directly into the development process, reflecting Asana's commitment to robust, proactive security. Topics Discussed: Felix discusses his transition from software engineering to product security and his strategic move from Google to Asana. Strategies for integrating security seamlessly into product development to enhance safety without compromising functionality. How effective security practices can accelerate business processes and foster trust with users. The importance of collaboration across different organizational functions to ensure comprehensive security coverage. The role of leadership in fostering a security-centric culture within tech companies. Insights into upcoming challenges and innovations in the field of application security.
In this episode of the Future of Application Security, Harshil speaks with Steve Lukose, Vice President of Security at Clari, about how security is becoming a business enabler rather than just an organization.  Steve explains why SLAs will become one of the benchmarks for security experts to use, but that it won’t necessarily be for all aspects of security. Still, they’ll be a great tool to help security organizations plan ahead for their next steps.  They also discuss the importance of cross functional collaboration, why your team should build relationships outside of the group, and how regulatory bodies are driving change.  Topics discussed: The importance of building relationships within your team and outside of it. Why SLAs will become a benchmark for security leaders to use for planning their next business steps. How security leaders can work with their teams, partners such as engineers, and stakeholders to make sure they stay on track and keep focus. How product managers can help facilitate projects by understanding what each stakeholder needs. How security transcends barriers by becoming a business enabler, shifting from a restrictive function to one that supports and enhances organizational objectives and growth. The importance of cross functional collaboration. How scrutiny from regulatory bodies such as the SEC is driving change.
In this episode of the Future of Application Security, Harshil speaks with Aruneesh Salhotra, CEO and Fractional CISO, SNM Consulting Inc. They discuss the unique challenges and opportunities of application security in the financial sector, including how the "necessary evil" of regulations is increasing accountability around security efforts. They also talk about the need for more vigilant software supply chain security, two better approaches to vulnerability management, and how AI can create self-sufficiency among developers. Topics discussed: The "necessary evil" of regulations and how they're increasing accountability around data storage, pen testing, and more. Two approaches security teams can take to better manage application vulnerabilities: a call graph and runtime SCA. What your attack surface is and how to effectively manage it. The increasing importance of software supply chain security and the value of establishing an open source program office. Why security should be everyone's job and how adopting security today will bear fruit tomorrow. How AI can increase developer self-sufficiency by giving feedback and insights on security actions.
In this episode of the Future of Application Security, Harshil speaks with Christine Gadsby, VP, Product Security at BlackBerry, a software company specializing in cybersecurity. They discuss the new initiatives driving software transparency, like SBOMs and VEX, and how adoption will not only come from regulations but from companies holding their software suppliers more accountable. They also talk about the need for better telemetry practices and more connected tooling and how security professionals can get involved in industry change and mentorship. Topics discussed: The important role frameworks like NIST 800-218 and CISA's Secure By Design will play in establishing standards. The ways in which SBOMs and VEX are driving software transparency that will keep customers safer. How commercial industries will increase their software supplier accountability in response to the rising cost of insecurity. How many companies lack knowledge about what's in the software they sell and the importance of having good telemetry practices. Why lack of good tools and the ability to connect tools is a challenge to product security today. Advice to security professionals about not letting things like SBOM and VEX get away from you as you prepare for the future of software development. How product security professionals can get involved with industry efforts to drive change.
In this episode of the Future of Application Security, Harshil speaks with Chad Girouard, AVP Application Security at LPL Financial, a provider of investment and business solutions. They discuss how security teams can better engage with developers, and how they can encourage secure coding through scanning tools and security champion programs. They also talk about how to manage the "results deluge" with single-pane-of-glass tools, how AI can help with more meaningful reporting, and why security buy-in is a team effort. Topics discussed: How to manage the various challenges of application security: competing tools, relationships, maturity, and more. How to bridge the different priorities of security teams and developers. How to encourage more secure coding by shifting left and developing a security champions program. Why leading and implementing security buy-in and processes is a team effort across the organization. How to manage today’s “results deluge” with single-pane-of-glass tools and more meaningful reporting. How AI can help discern real findings from all the information that a security team collects. What's the most important security metric to measure in 2024? It's Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
In this episode of the Future of Application Security, Harshil speaks with Dave Ferguson, Director of Technical Product Management, Software Supply Chain Security at ReversingLabs, which offers software supply chain security analysis platform. They discuss the rising need for software supply chain security as a result of the complexities around how software is built today. They also talk about ways to identify novel attacks through analyzing software behaviors, how efforts like SBOMs and registries help increase transparency, and why software supply chain security needs to evolve from just looking for vulnerabilities. Topics discussed: How Dave's diverse background in security, as well as his piqued interest around the SolarWinds and 3CX attacks, led to his focus on software supply chain security today. How a product manager leads by working with development teams, meeting with customers, incorporating new features and integrations, and helping bring new solutions to market. How the complexities associated with building software today — like open source and automation — have increased the possibility of adversaries slipping in.  Why analyzing software behavior across previous builds and seeing what's changed can help flag novel attacks. Today's trends that are increasing transparency in software creation, including the rising demand for SBOMs and the possibility of trust registries for commercial software. Why software supply chain security approaches need to move beyond just looking at vulnerabilities to find ways to root out all malicious activity. RELATED RESOURCE:  Today, most application security tools are designed to find vulnerabilities, not fix them. What is noise and what is risk? And, more importantly, how do you accelerate the remediation of the most critical vulnerabilities? The answer lies within one key metric — Mean Time to Remediate (MTTR).  Taking a better strategy to decrease your MTTR and keep your organization safe can begin today — download the paper to learn how.
In this episode of the Future of Application Security, Harshil speaks with Curtis Koenig, Head of Application Security at Gen, a multinational software company that provides cybersecurity software and services. They discuss why it's key to be able to articulate why security matters and how it impacts business goals, and what Curtis has learned about how different industries approach risk. They also talk about how security can help engineering be more efficient by speaking their language, various metrics that can assess your training and communication, and what the future of LLMs and security looks like. Topics discussed: Curtis's background in various industries and what he's learned about how culture, goals, and risk vary. How learning about a company's culture and goals first can help you translate how security matters to them. How to create a security strategy roadmap, how often to revisit those goals, and how to incorporate frameworks to sell across the business. How security can help engineering be more efficient by speaking their language and translating information into actionable tasks. What metrics to track that can help you learn more about how well your training and operations are working. How LLMs are helping with software development today, and why they can introduce more security issues if developers aren't thinking wisely about using it.
In this episode of the Future of Application Security, Harshil speaks with Arthur Loris, Senior Manager, Product Security at Ping Identity, a company that provides self-hosted identity access management (IAM) solutions. They discuss what product security constitutes at Ping Identity, the biggest challenge to great product security, and how security teams need more strategic, tactical plans to achieve their goals. They also talk about better approaches to risk remediation and why it's more effective to tell the story about how your security efforts improved the organization instead of just generating tickets. Topics discussed: How Ping Identity defines product security. The biggest challenge to product security, which involves building good partnerships with the engineering team. How security teams can be better messengers of tasks that are created by the threat landscape. A better approach to risk remediation and how to to think about it at scale. Better ways of measuring your security efforts, and why telling a story about your impact — like how much money you saved — is more effective than simply generating tickets. How security teams can flatten the learning curve when understanding the development process. What the future of product security will look like, and why it should include an increased focus on strategy.
In this special episode of the Future of Application Security, recorded at the Developers & Security are Friends Day, Eric speaks with James Wickett, co-founder and CEO of DryRun Security, a company that provides security products for developers. They discuss the misaligned incentives between developers and security and how teams can learn how to speak the same language to increase value. They also talk about how the SLIDE Model helps with context analysis, why you should focus less on control and more on context and composition in your security, and how organizations can close their knowledge gaps. Topics discussed: Some of the frictions between security and developers, including how incentives are often misaligned and how each team has a different focus. How to talk the same language so that security and developers can build relationships that bring value to their organizations. What the SLIDE Model is and how it can help you better understand the context of your security actions and your priorities. How organizations can fill in their knowledge gaps and why it's key to return to first principles in a world of automation and tooling. How security impacts an organization through control, composition, and context, and why organizations should lessen their dependence on control. How security is like barbeque, and why Oklahoma is a great analogy for a DevSec model.
In this special episode of the Future of Application Security, recorded at the Developers & Security are Friends Day, Eric speaks with Colleen Dai, Senior Security Researcher at Semgrep, an open source static analysis tool. They discuss strategies security teams can take to reduce false positives, use secure defaults to eliminate bug classes, and reduce complexity in security decision-making. They also talk about ways to build the relationships between security, developers, and engineers, which includes aligning on goals, communication, and recognition. Topics discussed: Colleen's background and what her security research role at Semgrep entails. How to use secure defaults to eliminate bug classes and reduce the complexity in security decisions. How to reduce false positives by writing rules and checks, especially ones that are customized to your organization. How to better align the goals of security and developers by focusing on creating good software — and good software is secure software. How to build relationships with engineers through communication and recognition, not just talking through Jira tickets. Why security and developers still struggle with cross-site scripting and how it can be fixed.
In this special episode of the Future of Application Security, recorded at the Developers & Security are Friends Day, Eric speaks with Johnathan Kuskos, Founder of Chaotic Good Information Security, a boutique professional services company. They discuss what it's like to be a pen tester, some of the unusual things found during testing, and how the 15 Minutes Rule helps you not waste time during your testing. They also talk about the tradeoffs of security when it comes to “good, fast, or cheap,” simple ways to determine priorities, and how to strengthen relationships between security and developers. Topics discussed: How security and developers can close divides through better communication and more forward thinking. Why security can't necessarily have an approach that's good, fast, and cheap, but how they make compromises to have a bit of all three. How to determine your security priorities, and how to perform a smoke test to see where security overlaps with other departments to identify those priorities. Some of the stranger things found during pen testing, including a git folder on a website.  Why vulnerability and exploitability are two different things, and how to assess both. How the 15 Minutes Rules can help you assess as much functionality as possible, and why it sometimes exposes more gaps in playbooks and incident response than intended.
In this special episode of the Future of Application Security, recorded at the Developers & Security are Friends Day, Eric speaks with Jim Manico, Founder and CEO of Manicode Security, a secure coding education firm. They discuss the various challenges around certain items on the OWASP Top Ten list, including server side request forgery and access control, and how security and developers can partner for better logging and alerting. They also talk about the courses Jim offers and why the biggest one in demand today is AI and security. Topics discussed: What are the biggest changes in the OWASP Top Ten, and the challenges that accompany two of the list’s issues: server side request forgery and access control. What issue is Jim surprised to see on the OWASP Top Ten. How developers and security can work more closely together to create a better approach to logging and alerting. Why the best approach to DevOps is to have it as a service and a liaison team, not as a merger of individuals from across the organization. Why training on AI and security is increasing in demand today. How security professionals and developers are like professional wrestling superstars.  
In this episode of the Future of Application Security, Harshil speaks with Madjid Nakhjiri, Head of Product Security and Lead Security Architect at TuSimple, a global autonomous driving technology company. They discuss the current landscape of automotive security today, why the industry is expanding its safety initiatives to cyber security initiatives, and the standards rising up to ensure that security. They also discuss the challenges to threat analysis and remote testing for vehicles, and what role VSOCs and AI will play in the future of automotive security. Topics discussed: An overview of the current landscape of automotive security, and how the automotive industry, which already has a long history of safety initiatives, it's now turning its attention to cyber security. The standards that are being put in place for automotive companies around the world, and how companies are trying to meet those standards. Why the automotive industry needs experienced product security practitioners in order to perform effective architecture analysis. The challenges to performing threat detection and remote pen testing on vehicles, and why threat analysis needs to be as automated and virtualized as possible. What the future of automotive security looks like, why we'll see a rise in VSOCs, and what role AI will play.
In this episode of the Future of Application Security, Harshil speaks with David Kosorok, Director of AppSec at Toast, a restaurant point of sale and management system. They discuss how to build an application security program from the ground up by prioritizing initiatives, establishing security champions, and bringing in great people — and why gathering and analyzing good data is the foundation to it all. They also discuss how to identify and fix struggles your team may have, why collaborating with product managers is key, and ways in which to positively impact security culture.   Topics discussed:   How to build an appsec program from the ground up by establishing and prioritizing initiatives, leveraging security champions and ambassadors, identifying resources, and bringing in great people. The importance of collecting and analyzing data in order to gain clarity and understanding on the current state of security and where to take action. Why working with product managers is key to building better security programs, and how to build trust and collaboration with others across the organization. How to identify struggles the team is having in implementing security standards, and how to improve processes through education and vision. How to impact security culture by increasing transparency through regular open meetings, storytelling, and inspiration. How David has mentored individuals who went on to join the security community. The importance of sharing learnings to the security community to increase overall education and awareness.
In this episode of the Future of Application Security, Harshil speaks with Tim Kelly, Director, Security Engineering at Workrise, a technology company with a platform that supports the energy workforce. They discuss the importance of collecting, storing, and analyzing data in order to enhance application security efforts, and how to go about building a data program that does that. They also discuss the ways in which you can use data to inform your security efforts, how to use data to help you inventory and prioritize vulnerability management, how to get to a 100% success rate with data-backed solutions, and what the future of data-driven application security will look like. Topics discussed: How Tim's background in experimental psychology and data analytics informs his work as the Director of Security Engineering. The definition of data engineering and how the practice can apply to application security. Why data is important for security and how a big part of collecting and analyzing data for its insights is because "you can't secure what you can't see." How to play into your strengths when building a data program by looking at your current capabilities, including leveraging a business insights team. How you can use data to determine the efficiency of your vulnerability management program, how to monitor performance, and how to find out where your efforts are producing the most value. The benefits of using data to inform your security approach, and how to get to 100% success rates with fixes by doing so. What the future of application security will look like and how teams can integrate more data analysis practices.  
In this episode of the Future of Application Security, Harshil speaks with Derek Samford, Senior Director of Product Security at Avalara, a company that builds cloud-based tax compliance solutions. They discuss Derek's approach to product security, including how his team uses data to drive visibility, how feedback loops can build maturity, and how they create application grade cards that inform remediation efforts. They also discuss how everyone is invited to contribute to product security solutions, how they create custom training for each new process, and the importance of empathy. Topics discussed: How Derek's varied background brought him from network engineering to scalability and performance testing, to field support, to building a security validation team, to today building applications at Avalara from the ground up. Why empathy is the most important skill you can have in security, and why it allows you to help others do their best work. How Derek's team practically approaches security, from running the same tools developers do, to having a strong security champions program, to encouraging open feedback. How Alavara builds collaboration by inviting anyone who wants to contribute to security solutions to be part of the working group. How Alavara uses data to help them understand what they're protecting, to gain greater visibility, and to unify their processes. How standardized processes and feedback loops create maturity over time. The importance of education, and why they create training specific for the organization that focus on "our tools, our processes, and our recommendations around security."
In this episode of the Future of Application Security, Harshil speaks with Jacob Salassi, Director, Product Security at Snowflake, a cloud computing and data management company. They discuss how Snowflake approaches product security — from what they expect engineers and developers to do, to their risk-based reporting — and why Jacob takes a scientific approach to it. They also discuss how Jacob's team creates property graphs to better understand risk flows and what to prioritize, automated threat detection, how they're writing more intelligent detections at scale, and the challenges of big data to product security. Topics discussed: How Snowflake approaches product security, including: How they build autonomy for engineers through repeatable processes How they optimize for business value and not just security outcomes, and  Why they take a quantitative risk-based reporting approach Why Jacob takes a "science, not art" approach to product security, and why he defines product security as anything related to the security posture of the service. The ways in which data- at- scale and disparate data sources prove to be a challenge for threat detection, and why security teams can benefit from pulling together those sources so they can uniformly analyze data across systems. How Jacob's team created and scaled a repeatable and structured method to risk assess every new feature that's being shipped. How this method of risk assessment and scoring helps uncover dynamics in their environment, gives developers better prioritization of their work, and enables automated threat detection. Challenges to the observability problem of who can own and access data, how many people are ingesting APIs, how much it's costing, and other access concerns. The ways in which they're communicating KPIs and risk posture through live dashboards, and how they're thinking about powering quantitative risk analysis and forecasting through those dashboards.  
In this episode of the Future of Application Security, Harshil speaks with Helen Oakley, Lead Architect for Software Supply Chain Security at SAP, which develops enterprise software for business operations. They discuss the need for software supply chain security, especially considering how much of software is open source today, and what the current state of adoption is across industries. They also discuss how you can optimize SBOMs and the misconceptions around them, where organizations can start implementing software supply chain security, and why it's needed to protect both infrastructure and human life. Topics discussed: What software supply chain security is, and the different considerations — like open source components — that make it a priority for organizations today. The current state of adoption for software supply chain security, the challenges to adoption, and which industries are on the forefront while others lag behind. How software supply chain security and SBOMs will evolve, especially considering the need for safety around digitally-connected devices that can impact human well-being. Some of the misconceptions around what SBOMs offer, and what more has to be done in addition to SBOM implementation to make supply chains more secure. Advice for organizations looking to get started on or ramp up their software supply chain security approach, which includes improving SBOM quality and automation. How to be prepared to receive and consume SBOMs from vendors, and what tools to use to analyze that data. What types of benefits and risks AI will pose for software supply chain security in the future, especially around transparency.
loading
Comments 
Download from Google Play
Download from App Store