SlideShare une entreprise Scribd logo
1  sur  49
Insecurity in Information
Technology
Tanya Janca
TaJanca@Microsoft.com
Tanya.Janca@owasp.org
OWASP Ottawa Chapter Leader
OWASP DevSlop Project Leader
@SheHacksPurple
@SheHacksPurple
All of this creates the feeling of insecurity about people’s jobs and
how to do them well.
This leads to predictably negative behaviour.
Deviant Behaviour
Moral Disengagement
Reduced Job Involvement
Risk Taking Behaviour
Reduction of Organizational
Citizenship Behavior
(positive workplace activity and involvement)
All of this negative behavior leads to insecure software.
The Plan:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
The Plan:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
The Plan:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
The Plan:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
The Plan:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
@SheHacksPurple
Start Security Earlier!
Requirements Design Code Testing Release
Push Left!
@SheHacksPurple
Break security testing
into smaller pieces
1
1
1Provide free training to developers1-2
2
(Off Colour) Job Shadowing
@SheHacksPurple
1
1
2
Give Developers Security Tools!
(They just might use them)
OWASP: Your new BFF!!!
The Open Web Application Security Project
2
2
2
A message for
conferences
No more “we’re screwed” keynotes.
2
In Summary:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
In Summary:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
In Summary:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
In Summary:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
In Summary:
1. Support dev and sec team with processes, training, and
resources so they can confidently get the job done.
2. Initiate and then maintain culture change.
It has to start somewhere…. Why not with you?
ANY
QUESTIONS?OWASP Ottawa Chapter Leader
OWASP DevSlop Project Leader
@SheHacksPurple
Tanya Janca
TaJanca@Microsoft.com
Tanya.Janca@owasp.org

Contenu connexe

Tendances

Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WaySeniorStoryteller
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)Dinis Cruz
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionAaron Rinehart
 
BHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applicationsBHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applicationsMagno Logan
 
AppSec is Eating Security
AppSec is Eating SecurityAppSec is Eating Security
AppSec is Eating SecurityAlex Stamos
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
GDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringGDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringAaron Rinehart
 
DevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatopsDevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatopsDevSecCon
 
Outpost24 webinar - The economics of penetration testing in the new threat la...
Outpost24 webinar - The economics of penetration testing in the new threat la...Outpost24 webinar - The economics of penetration testing in the new threat la...
Outpost24 webinar - The economics of penetration testing in the new threat la...Outpost24
 
Pivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringPivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringAaron Rinehart
 
How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013bugcrowd
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringAaron Rinehart
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...SeniorStoryteller
 
Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryJames Wickett
 
Effective approaches to web application security
Effective approaches to web application security Effective approaches to web application security
Effective approaches to web application security Zane Lackey
 
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...Freek Kauffmann
 
Ops Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon EdwardsOps Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon EdwardsSeniorStoryteller
 

Tendances (20)

Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the Way
 
New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)New Era of Software with modern Application Security (v0.6)
New Era of Software with modern Application Security (v0.6)
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
 
BHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applicationsBHack 2012 - How to protect your web applications
BHack 2012 - How to protect your web applications
 
The R.O.A.D to DevOps
The R.O.A.D to DevOpsThe R.O.A.D to DevOps
The R.O.A.D to DevOps
 
AppSec is Eating Security
AppSec is Eating SecurityAppSec is Eating Security
AppSec is Eating Security
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
GDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringGDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos Engineering
 
DevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatopsDevSecCon Asia 2017 Arun N: Securing chatops
DevSecCon Asia 2017 Arun N: Securing chatops
 
Outpost24 webinar - The economics of penetration testing in the new threat la...
Outpost24 webinar - The economics of penetration testing in the new threat la...Outpost24 webinar - The economics of penetration testing in the new threat la...
Outpost24 webinar - The economics of penetration testing in the new threat la...
 
Pivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringPivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos Engineering
 
How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos Engineering
 
Year Zero
Year ZeroYear Zero
Year Zero
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
 
Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous Delivery
 
Effective approaches to web application security
Effective approaches to web application security Effective approaches to web application security
Effective approaches to web application security
 
PNSQC 2021 January 28 Culture Jam
PNSQC 2021 January 28 Culture JamPNSQC 2021 January 28 Culture Jam
PNSQC 2021 January 28 Culture Jam
 
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
 
Ops Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon EdwardsOps Happens: DevOps Beyond Deployment - Damon Edwards
Ops Happens: DevOps Beyond Deployment - Damon Edwards
 

Similaire à DevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca

Identify Development Pains and Resolve Them with Idea Flow
Identify Development Pains and Resolve Them with Idea FlowIdentify Development Pains and Resolve Them with Idea Flow
Identify Development Pains and Resolve Them with Idea FlowTechWell
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
Welcome To Itteco
Welcome To IttecoWelcome To Itteco
Welcome To Ittecoi.paramonau
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane LackeyYandex
 
Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)Angie Chang
 
Staying research led with almost no resources (UXcamp 2019)
Staying research led with almost no resources (UXcamp 2019)Staying research led with almost no resources (UXcamp 2019)
Staying research led with almost no resources (UXcamp 2019)Kea Zhang
 
Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...
Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...
Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...David Walker
 
Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...
Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...
Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...Selenium Conference Austin 2017
 
The Three Pillars of Continuous Delivery - Boston Continuous Delivery Event
The Three Pillars of Continuous Delivery - Boston Continuous Delivery EventThe Three Pillars of Continuous Delivery - Boston Continuous Delivery Event
The Three Pillars of Continuous Delivery - Boston Continuous Delivery EventXebiaLabs
 
Chemical Experiment Presentation.pptx
Chemical Experiment Presentation.pptxChemical Experiment Presentation.pptx
Chemical Experiment Presentation.pptxLudoVikus1
 
DevOps Is More than Dev and Ops: It’s about Tearing Down Walls
DevOps Is More than Dev and Ops: It’s about Tearing Down WallsDevOps Is More than Dev and Ops: It’s about Tearing Down Walls
DevOps Is More than Dev and Ops: It’s about Tearing Down WallsTechWell
 
Culteral impediments to DevOps
Culteral impediments to DevOpsCulteral impediments to DevOps
Culteral impediments to DevOpsClement Pickering
 
How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014gdusbabek
 
BoSEU22 | Saielle DaSilva | How to Hack the Culture Stack
BoSEU22 | Saielle DaSilva | How to Hack the Culture StackBoSEU22 | Saielle DaSilva | How to Hack the Culture Stack
BoSEU22 | Saielle DaSilva | How to Hack the Culture StackBusiness of Software Conference
 
DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...
DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...
DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...DevOpsDays Houston
 
Modern agile overview
Modern agile overviewModern agile overview
Modern agile overviewSteve Purkis
 
Deploy First, Develop Later
Deploy First, Develop LaterDeploy First, Develop Later
Deploy First, Develop LaterJared Novack
 

Similaire à DevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca (20)

Identify Development Pains and Resolve Them with Idea Flow
Identify Development Pains and Resolve Them with Idea FlowIdentify Development Pains and Resolve Them with Idea Flow
Identify Development Pains and Resolve Them with Idea Flow
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
Welcome To Itteco
Welcome To IttecoWelcome To Itteco
Welcome To Itteco
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane Lackey
 
Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)
 
Staying research led with almost no resources (UXcamp 2019)
Staying research led with almost no resources (UXcamp 2019)Staying research led with almost no resources (UXcamp 2019)
Staying research led with almost no resources (UXcamp 2019)
 
Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...
Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...
Devops & Agility - Build the Culture, Get the Tools, Win the Day - Dundee Tec...
 
Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...
Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...
Tranformative Culture - The Shift From QA To Engineering Productivity - Selen...
 
The Three Pillars of Continuous Delivery - Boston Continuous Delivery Event
The Three Pillars of Continuous Delivery - Boston Continuous Delivery EventThe Three Pillars of Continuous Delivery - Boston Continuous Delivery Event
The Three Pillars of Continuous Delivery - Boston Continuous Delivery Event
 
Chemical Experiment Presentation.pptx
Chemical Experiment Presentation.pptxChemical Experiment Presentation.pptx
Chemical Experiment Presentation.pptx
 
DevOps Is More than Dev and Ops: It’s about Tearing Down Walls
DevOps Is More than Dev and Ops: It’s about Tearing Down WallsDevOps Is More than Dev and Ops: It’s about Tearing Down Walls
DevOps Is More than Dev and Ops: It’s about Tearing Down Walls
 
Culteral impediments to DevOps
Culteral impediments to DevOpsCulteral impediments to DevOps
Culteral impediments to DevOps
 
How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014How To (Not) Open Source - Javazone, Oslo 2014
How To (Not) Open Source - Javazone, Oslo 2014
 
BoSEU22 | Saielle DaSilva | How to Hack the Culture Stack
BoSEU22 | Saielle DaSilva | How to Hack the Culture StackBoSEU22 | Saielle DaSilva | How to Hack the Culture Stack
BoSEU22 | Saielle DaSilva | How to Hack the Culture Stack
 
DevOps for Managers
DevOps for ManagersDevOps for Managers
DevOps for Managers
 
DevOps for Humans
DevOps for HumansDevOps for Humans
DevOps for Humans
 
DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...
DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...
DevOpsDays Houston 2019 -Kevin Crawley - Practical Guide to Not Building Anot...
 
Modern agile overview
Modern agile overviewModern agile overview
Modern agile overview
 
Deploy First, Develop Later
Deploy First, Develop LaterDeploy First, Develop Later
Deploy First, Develop Later
 
Time to Good DX
Time to Good DXTime to Good DX
Time to Good DX
 

Plus de DevSecCon

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon
 

Plus de DevSecCon (20)

DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
DevSecCon London 2019: Workshop: Cloud Agnostic Security Testing with Scout S...
 
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
DevSecCon London 2019: Are Open Source Developers Security’s New Front Line?
 
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
DevSecCon London 2019: How to Secure OpenShift Environments and What Happens ...
 
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
DevSecCon London 2019: A Kernel of Truth: Intrusion Detection and Attestation...
 
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security KnowledgeDevSecCon Seattle 2019: Containerizing IT Security Knowledge
DevSecCon Seattle 2019: Containerizing IT Security Knowledge
 
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
DevSecCon Seattle 2019: Decentralized Authorization - Implementing Fine Grain...
 
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
DevSecCon Seattle 2019: Liquid Software as the real solution for the Sec in D...
 
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
DevSecCon Seattle 2019: Fully Automated production deployments with HIPAA/HIT...
 
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
 
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
DevSecCon Singapore 2019: crypto jacking: An evolving threat for cloud contai...
 
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
DevSecCon Singapore 2019: Can "dev", "sec" and "ops" really coexist in the wi...
 
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshopDevSecCon Singapore 2019: Workshop - Burp extension writing workshop
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
 
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we thinkDevSecCon Singapore 2019: Web Services aren’t as secure as we think
DevSecCon Singapore 2019: Web Services aren’t as secure as we think
 
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
DevSecCon Singapore 2019: An attacker's view of Serverless and GraphQL apps S...
 
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
 
DevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for KubernetesDevSecCon Singapore 2019: Preventative Security for Kubernetes
DevSecCon Singapore 2019: Preventative Security for Kubernetes
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heel
 
DevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificatesDevSecCon London 2018: Get rid of these TLS certificates
DevSecCon London 2018: Get rid of these TLS certificates
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
 

Dernier

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

DevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca

Notes de l'éditeur

  1. Who has seen this? Who has been treated this way? The first time I had someone run a vulnerability scan on an application I wrote this is what happened. I received the auto-generated report from the scanner and had no idea what it meant. When I asked the security person for help he told me that I was a programmer and I should know. When I had trouble fixing them he told me that if I was a good programmer I never would have had any issues in the first place. The entire interaction made me feel terrible. It also taught me not to ask for help from security when I had a security issue. This has GOT to change.
  2. What do Developers do that can make Security feel insecure? Don’t ask the security team’s advice, then write their own crypto. (this is BAD, crypto is HARD) When developers receive the security report sometimes they don’t fix anything, claiming they have more important things to do. Making the security team feel a bit like chop liver. Don’t cooperate to enable security testing, claiming they have no time/implying security is low priority. Do not take or ask for advice from the security team at all.
  3. What does security do that can make developers feel insecure? Security sends developers a 500 page, auto-generated, unvalidated report. Does not give usable security guidance to the developers when asked. Acts or is seen as a gate, slowing down the SDLC. Adds project requirements without explanation, “because security”. When revealing issues, sometimes they can make developers feel incompetent.
  4. ** There are many published studies to support these findings that job insecurities lead to these behaviors.
  5. Deviating from all those nice processes that you implemented in your work place
  6. Do you want someone with flexible morals handling your precious data?
  7. An uninspired IT staff is not one that gets things done on time, nor ensures quality
  8. In a room full of IT Security people I think we all know what this one means….
  9. Spilling coffee example. When people are acting like this, what kind of software are they making? Are they being diligent? Are they going the extra mile? I think not.
  10. When people are acting like this, what kind of software are they making? Are they being diligent? Are they going the extra mile? I think not. Review previous points for audience. So now we know what the problem is. Let’s talk about solutions.
  11. Make sure audience switches gears with you that this is the second part of the talk.
  12. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  13. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  14. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  15. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  16. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  17. Let’s create processes that work. It can’t take 3 weeks to get approval to do 30 minutes of work. There can’t be 21 different steps to get something approved. Someone 4 levels up from me should not be approving a change that I do when they have no idea who I am, what I do, or how it even works. How can they approve that? Let’s talk about processes that work and make people feel confident their doing their jobs right.
  18. You don’t have an Application Security team? The AppSec Team is the part of the security team that knows software and talks to developers. Helps them prioritize and achieve their security tasks and goals, and teach them about appsec. If you don’t have one, get one. Run, don’t walk.  If you work in an enterprise sized business it is not acceptable to not have one, you NEED ONE. AppSec is the cause of approximately a quarter of security incidents, why aren’t you spending a quarter of your security budget on it? I bet you’re not.
  19. For every new major software project assign an AppSec representative.  You Matrix them into the team, this is also called the “Partnership model”. That person will stay on the project and go to major meetings to offer security advice.  Anything security-related that the project team needs throughout their project this person will help with, or find the right person who can help. One point of contact with security for the entire project, keeping them on track to make secure software.  Caution: do not assign this person to 20+ projects, then they are a bottle neck and therefore also a problem. 3 projects max on top of their other responsibilities!
  20. Setup a secure SDLC, and start security from the start. Formalize security activities as part of your SDLC. For instance, during design we do threat modelling. It doesn’t matter what paradigm you use, everyone needs to know what they are building, make a plan, code it, test it and then perform maintenance. So formalize it.
  21. Security testing is cut into smaller pieces, so that it is more manageable and preferably does not slow down the SDLC any more than absolutely necessary.  For instance, doing static code analysis that only looks for XSS in one round, then another that only looks for SQLi, rather than doing one huge sweep that would take 2-3 weeks to analyze.  Security needs to learn to sprint.
  22. Ensure that all the results from automated tools have been fully validated, no more false positives.  If you are unsure, hire out/get more training. The reason for this is that you will lose the trust of the developers if you send them on wild goose chases. Also: if the output from your automated tool isn’t good enough for YOU to read, why do you think it’s good enough for developers to read?
  23. When I say training here I don’t mean “general IT Security Awareness”, I mean training that is specific to the work that you do. How to do the responsibilities of your job more securely. If you code, security coding training. If you design apps, I mean threat modelling and secure design training. Etc.
  24. Do you see this guy? Do you know what he’s so stressed out? It’s because he thinks he needs to know everything. No one needs to know everything. There is no shame in going on training so that you have a better handle on what you are expected to do for 40 hours+ per week.  If you are weak in a specific area, ask for training.  If there’s no budget train yourself online.  If you still don’t know, call a pro, that’s why the build us consultants in the factor.  Never leave important things as unknown or ambiguous, this is where insecurity starts.  
  25. What if we actually taught all of IT what security expected from them? If developers have a budget for only one course per year (or less!), they are NOT going to spend it on a security course. They are going to spend it on the cool new JavaScript front end framework or whatever else it is that is currently bright and shiny. Provide security training and you will see your security posture improve.
  26. Provide free security training to developers, and the rest of IT while you’re at it.  They should not be expected to pay for this out of their own training budgets.  If you are a developer and you “need to know everything” for your job, you are not going to spend your limited training dollars on security when there are ten other topics that need your attention this year.  But if the training was free and you had approval from your manager to attend…. you’d be there in a second.  Make this a reality for the dev team and watch your apps become more secure overnight.
  27. One more thing: Don’t do it once. Keep giving the training. I don’t want to hear about “that one time we gave them training, in 2012”. Keep doing it. This will help create a culture that “security is everybody’s job”, which is exactly what we want. Right?
  28. Another interesting way of learn is job shadowing. I’m not thinking of the usual sort of job shadowing, I’m thinking more of a “death by fire” type of job shadowing. Bring a developer on a security incident, the whole way through. Let them see the damage, the stress, the cost. The next time someone from the vulnerability assessment team gives a report with a false positive in it, make then go fix bugs with developers. So they will see the countless hours wasted when a false positive is sent. You know that saying “Walk a mile in someone else’s shoes?” Yeah. That.
  29. Let’s talk about resources. Because if you don’t have what you need to get the job done, the rest of this doesn’t really matter, does it?
  30. What if, instead of making all of IT read our minds, we explicitly defined what we wanted from them? What if we wrote a short, concise, understandable document with secure coding and secure design principles as a set of rules for developers to follow? For instance, ”all external facing applications will be accessible using HTTPS only”. Their app should be in pretty good shape from a security standpoint if they follow all the rules. I do NOT mean a 200 page check list. I don’t mean, a link to NIST or some other security policy. To be clear: I DO NOT MEAN compliance. And for the record, whatever you come up with must be easy to find, well socialized, and above all it must contain only security advice that is USABLE.
  31. The security team is NEVER allowed to respond to requests for help by sending links to extremely long documents (ITSG-33 or NIST, for example) that are essentially unreadable to non-security-people and leave them more confused than before.  Give specific and detailed advice.  If you don’t know the answer conduct research or hire someone to do it for you.  Not answering is NOT an option.
  32. A company MAY NOT publish an unreadable (too technical/all security jargon) to an unfindable/borderline-hidden location onto the intranet and call it a day. This is NOT useful. This is not helpful. This is making a problem, not solving one.
  33. Give developers security tools; they might actually use them.  Give them web app scanners, give them static analysis tools, buy them books, whatever they want.  Help them use them, show them how.  They are basically doing your jobs for you!  This is a great deal!
  34. Try not to worry about who has to pick up the bill.  Try. Try. I realize training and consultants costs money, but 1) it’s worth it if you need it 2) consider it a long term investment, 3) you are getting your mandate done by releasing secure applications and 4) it all costs less than a breach. All of it.
  35. Invite your developers to participate in OWASP. Offer to host it at your company! If there isn’t a chapter in your city, start one! This is a great way to get your developers interested in AppSec, because they are the care bears of security! Make full use of this excellent free resource!
  36. Now it’s time for culture change. At this point we’ve supported everyone in doing their jobs, and things are way better. But culture will cement the deal.
  37. From now on when there’s a problem, don’t blame someone. It’s not Bob or Alice’s error that is the problem, it’s that there weren’t processes or safeguards in place to stop the problem from happening. We don’t care about the who, we only care about how we are going to fix it, and then ensure it will never happen again. This is called a Blameless Post Mortem. It’s okay to fail. But it’s not okay to not learn from it when we do.
  38. If at all possible, always allow someone to “save face”. It will pave the path to a more friendly future.
  39. Physically locate the application security team near the developers.  It’s more difficult to be rude to someone’s face. 
  40. If at all possible, stop booking the “we’re all fucked” keynote talks at security conferences.  The ones that present huge problems but few or unclear solutions.  They do not inspire confidence, so why give them audience?  They do not help the situation, they only discourage security practitioners who already have an uphill battle.
  41. If you are a leader in your workplace, you will lead your team the right way, or the wrong way. Whether you mean to or not. Your team and everyone else is watching you and learning from you what is acceptable. You get to decide what tone you want to set, every day. Set the example of the positive ad professional culture you want, every time you speak. Every time you act. If you speak poorly about another team, you are saying that’s acceptable behavior in your workplace. If you use profanity, if you yell or bully. You are teaching everyone how to act. Provide leadership towards a culture shift, a shift to where people are polite, professional, hardworking and accountable. Lead by positive example, and they will follow you wherever you go.
  42. Summary
  43. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  44. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  45. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  46. We are going to go through this the whole way through, for the rest of the talk. This is the entire thing. Let’s work out way through.
  47. I call upon all of you to be the change you want to see. Be the bigger person. Be the one who admits they were wrong or that you don’t know. Keep a higher bar for yourself and your team relative than the rest of the company in terms of technical skill, professionalism, everything you do. If we are going to win this battle, we have to change the way we are doing things. This is a call to action. It has to start somewhere. Why not with you? PAUSE Thank you for your time and attention today.