PodGrabber.com
PodGrabber Logo/Mascot - Blue Gorilla with Red Headphones

Application Security PodCast - Archive

Generated 2026-04-09 23:11:14

← Back to PodGrabber Archives

Click title to play/pause!

Brad Geesaman - Redefining AppSec with AI: Shrinking Toil, Expanding Impact - How LLMs are able to reduce toil in triage-heavy AppSec workflows

Podcast image

Published: 10/28/2025 08:00:00

Brad Geesaman - Redefining AppSec with AI: Shrinking Toil, Expanding Impact - How LLMs are able to reduce toil in triage-heavy AppSec workflows Episode Details

Brad Geesaman, Principal Security Engineer at Ghost, joins the podcast today to explore how AI and large language models are transforming the world of application security. The discussion starts with the concept of "toil"—the repetitive, exhausting work that drains AppSec teams as they struggle to keep up with mountains of security findings and alerts. Brad shares his insights on how LLMs can provide meaningful leverage by handling the heavy lifting of triage, classification, and evidence gat...

OWASP Candidate Debate - 2025 Edition

Podcast image

Published: 10/15/2025 09:00:00

OWASP Candidate Debate - 2025 Edition Episode Details

In this special episode of the Application Security Podcast we meet nine of the OWASP Board of Directors candidates. Each candidate discusses their unique qualifications, experiences, and vision for OWASP's future. Topics include enhancing OWASP's impact, improving outreach and education, securing funding, and engaging local chapters. Don't miss this insightful debate as these candidates share their strategies to help secure a brighter future for OWASP. FOLLOW OUR SOCIAL MEDIA: ➜Twit...

Francesco Cipollone - Agentic AI Manifesto

Podcast image

Published: 09/23/2025 08:00:00

Francesco Cipollone - Agentic AI Manifesto Episode Details

Francesco Cipollone, the CEO of Phoenix Security, shares his extensive experience in AI and security, discussing the crucial difference between true AI agents and glorified chatbots. Learn why Phoenix Security utilizes six different LLMs instead of a single super agent. Understand the sobering economics behind AI implementation and the importance of adopting AI responsibly. Get practical advice on integrating AI agents to enhance, not replace, human capabilities, while touching on the Agentic...

Simon Gibbs & Devika Gibbs -- Building Bridges with Games

Podcast image

Published: 09/16/2025 08:00:00

Simon Gibbs & Devika Gibbs -- Building Bridges with Games Episode Details

Simon and Devika Gibbs, the innovative minds behind Cybersec Games, join us on the episode today. Discover how the Gibbs duo are revolutionizing the way we teach and learn security concepts through interactive gaming. Learn about their journey from developing stationary for agile teams to delving into the world of threat modeling games like Elevation of Privilege. We talk about the power of gamification in cybersecurity education, and get the inside scoop on their Cybersecurity Game Challenge...

Akansha Shukla - Modern AppSec: Securing APIs with Threat Modeling and DevSecOps

Podcast image

Published: 09/02/2025 08:00:00

Akansha Shukla - Modern AppSec: Securing APIs with Threat Modeling and DevSecOps Episode Details

Our guest today is Akansha Shukla, an information security professional with over 10 years of experience in application security, DevSecOps, and API security. We’re discussing why API security remains one of the least mature areas of AppSec today and exploring the challenges developers face when securing APIs. Akansha shares her insights on incorporating APIs into threat modeling exercises, the ongoing struggles with API discovery and inventory management, and the authorization challenges hig...

Getting Ready for the EU CRA

Podcast image

Published: 08/20/2025 07:00:00

Getting Ready for the EU CRA Episode Details

The European Union's Cyber Resilience Act is set to revolutionize how we approach product security worldwide. In this episode, we sit down with application security expert Nariman Aga-Tagiyev to break down everything you need to know about this legislation. Nariman has over 20 years of software development experience and today he’s sharing his expertise with us. Learn what the EU CRA is and why it matters for global software companies, key compliance requirements, and how OWASP SAMM can help ...

Marisa Fagan - Measuring Security Culture

Podcast image

Published: 08/05/2025 07:00:00

Marisa Fagan - Measuring Security Culture Episode Details

Marisa Fagan, Head of Product at Katilyst and veteran security culture expert joins us today to share practical strategies for building and scaling security champions programs that actually work, from designing effective pilots to avoiding common pitfalls that can derail your initiatives. Learn how to motivate developers using the SAPs model (Status, Access, Power, Stuff), why getting management buy-in is crucial before launching, and discover the metrics that truly demonstrate security...

Aram Hovsepyan -- Your Security Dashboard is Lying to You: The Science of Metrics

Podcast image

Published: 07/22/2025 07:00:00

Aram Hovsepyan -- Your Security Dashboard is Lying to You: The Science of Metrics Episode Details

Aram Hovsepyan joins the podcast today to chat about the misconceptions behind common security metrics. Aram tells us how total vulnerability counts and CVSS scores can be misleading and he introduces us to the Goal Question Metric framework, this framework is a better approach to building truly effective security dashboards. Learn about the critical qualities of good metrics and how to ensure that your metrics accurately reflect your organization's security posture and readiness. Also, disco...

Sean Varga -- OWASP Top 10 for AppSec Sales

Podcast image

Published: 07/15/2025 08:00:00

Sean Varga -- OWASP Top 10 for AppSec Sales Episode Details

We’re discussing the intersections of application security (AppSec) and sales strategy with our guest, Sean Varga. Sean shares the unique challenges and best practices in AppSec sales, like the importance of empathy, understanding customer needs, and community participation. Learn about the OWASP top 10 for AppSec Sales and discover how to achieve success by aligning with customer goals, maintaining detailed living documents, and fostering strong partnerships. FOLLOW OUR SOCIAL MEDIA: ➜...

Sarah-Jane Madden -- What AI means for AppSec

Podcast image

Published: 07/09/2025 08:00:00

Sarah-Jane Madden -- What AI means for AppSec Episode Details

Sarah Jane Madden joins us to discuss the evolving role of AI in software development. We reflect on the changes and challenges posed by AI, including the potential for over-reliance and the misconception that traditional software engineering practices like the SDLC are obsolete. The conversation explores the nuances of AI-generated code, emphasizing the importance of maintaining foundational engineering skills and a critical understanding of the tools used. Madden shares insights from her ke...

Dag Flachet -- Kaizen for your Appsec Program

Podcast image

Published: 06/17/2025 10:00:00

Dag Flachet -- Kaizen for your Appsec Program Episode Details

Dag Flachet joins us to discuss the concept of Kaizen and its application in improving application security. Dag shares his journey into the world of security, emphasizing the importance of iterative, small-step improvements. The conversation delves into how organizations can effectively implement maturity models to enhance their security programs, the limitations of compliance-focused frameworks like ISO 27,000 and SOC 2, and the practical application of Kaizen principles. They also explore ...

Javan Rasokat and Andra Lezza -- When Chatbots Go Rogue - Lessons Learned from Building and Defending LLM Applications

Podcast image

Published: 03/18/2025 07:00:00

Javan Rasokat and Andra Lezza -- When Chatbots Go Rogue - Lessons Learned from Building and Defending LLM Applications Episode Details

Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of data security. This discussion sheds light on the evolving landscape of AI and LLM security, offering practical advice for developers and security ...

Jim Routh -- The CISO Transition to the rest of life

Podcast image

Published: 03/11/2025 07:00:00

Jim Routh -- The CISO Transition to the rest of life Episode Details

Former CISO Jim Routh discusses his perspective on retirement and career fulfillment in cybersecurity. Rather than viewing retirement as simply stopping work, Routh describes his three-filter approach: working only with people he respects and admires, doing only work he finds fulfilling, and controlling when he works. He shares valuable lessons learned about which post-retirement opportunities truly bring satisfaction and explains why he avoids certain roles. Routh emphasizes the importance o...

Henrik Plate -- OWASP Top 10 Open Source Risks

Podcast image

Published: 03/04/2025 07:00:00

Henrik Plate -- OWASP Top 10 Open Source Risks Episode Details

Henrik Plate joins us to discuss the OWASP Top 10 Open Source Risks, a guide highlighting critical security and operational challenges in using open source dependencies. The list includes risks like known vulnerabilities, compromised legitimate packages, name confusion attacks, and unmaintained software, providing developers and organizations a framework to assess and mitigate potential threats. Henrik offers insights on how developers and AppSec professionals can implement the guidelines. Ou...

Tanya Janca -- A Secure SDLC from a Developer's Perspective

Podcast image

Published: 02/26/2025 08:00:00

Tanya Janca -- A Secure SDLC from a Developer's Perspective Episode Details

Security expert Tanya Janca discusses her new book "Alice and Bob Learn Secure Coding" and shares insights on making security accessible to developers. In this engaging conversation, she explores how security professionals can better connect with developers through threat modeling, maintaining empathy, and creating inclusive learning environments. Tanya emphasizes the importance of system maintenance after deployment and shares practical advice on input validation, while highlighting how secu...

Mehran Koushkebaghi -- Security as a Systemic Concern: How to develop Anti-Requirements

Podcast image

Published: 02/11/2025 11:00:00

Mehran Koushkebaghi -- Security as a Systemic Concern: How to develop Anti-Requirements Episode Details

Mehran Koushkebaghi, a seasoned engineering expert, delves into the intricacies of systemic security. He draws parallels between civil engineering and IT systems, and explains the importance of holistic thinking in security design. Discover the difference between semantic and syntactic vulnerabilities and understand how anti-requirements play a critical role in system resilience. This episode offers fresh perspectives on application security. Books recommended by Mehran: Critical System Think...

Kalyani Pawar -- Shaping AppSec at Startups

Podcast image

Published: 02/04/2025 09:00:00

Kalyani Pawar -- Shaping AppSec at Startups Episode Details

Kalyani Pawar shares critical strategies for integrating security early and effectively in AppSec for startups. She recommends that startups begin focusing on AppSec around the 30-employee mark, with an ideal ratio of one AppSec professional per 10 engineers as the company grows. Pawar emphasizes the importance of building a security culture through "culture as code" - implementing automated guardrails and checkpoints that make security an integral part of the development process. She advises...

Milan Williams -- AppSec Metrics

Podcast image

Published: 01/14/2025 09:00:00

Milan Williams -- AppSec Metrics Episode Details

Milan Williams discusses the importance of application security metrics and how to make them both meaningful and actionable. She explains that metrics are crucial for tracking progress in what can often feel like an overwhelming security landscape, and they're valuable for career advancement and securing resources. We discuss metrics categories and several specific metrics that are good to track. Milan shares important principles on the importance of making metrics actionable through st...

MO Sadek -- Building an AppSec Program from Scratch

Podcast image

Published: 01/08/2025 12:00:00

MO Sadek -- Building an AppSec Program from Scratch Episode Details

Mo Sadek shares his unique journey of building an Application Security program from scratch at Roblox. Mo discusses his unconventional path, including temporarily joining the infrastructure team to truly understand engineering challenges. He emphasizes that security isn't about mandating rules, but about making processes easier and more secure by default. Mo shares his insights on how to build effective cross-team security relationships and approaches for gaining leadership buy-in. Mo'...

Brett Crawley -- Threat Modeling Gameplay with EoP

Podcast image

Published: 12/10/2024 07:00:00

Brett Crawley -- Threat Modeling Gameplay with EoP Episode Details

Brett Crawley discusses the Elevation of Privilege (EoP) card game, a powerful tool for threat modeling in software development. The discussion explores recent extensions to the game including privacy-focused suits and TRIM (Transfer, Retention/Removal, Inference, Minimization) categories. Crawley emphasizes that threat modeling shouldn't end with the game but should be an ongoing process throughout an application's lifecycle, ideally starting before implementation. He also shares insights fr...

Matin Mavaddat - Understanding Security as a Systemic Concern: The Role of Anti-Requirements

Podcast image

Published: 11/12/2024 07:00:00

Matin Mavaddat - Understanding Security as a Systemic Concern: The Role of Anti-Requirements Episode Details

Matin Mavaddat discusses his perspective on security as a systemic concern, developed from his background in requirements engineering and systems architecture. He introduces the concept of "anti-requirements" - defining what a system should not do - and distinguishes between "syntactic security" (addressing technical vulnerabilities that are always incorrect) and "semantic security" (context-dependent security emerging from system interactions). Mavaddat shares his perspective that security i...

Kayra Otaner -- DevSecOps

Podcast image

Published: 10/29/2024 07:00:00

Kayra Otaner -- DevSecOps Episode Details

Kayra Otaner joins the podcast today to discuss DevSecOps and answer the question, is it dead? Kayra is the Director of DevSecOps at Roche and is highly involved in the DevSecOps community. Kayra states that DevSecOps in its traditional form is “dead” and that each organization should approach its needs based on their size. Otaner introduces the concept of "security as code" and "policy as code" as more effective approaches, where security functions are codified rather than relying on traditi...

François Proulx - Arbitrary Code Execution 0-day in Build Pipeline of Popular Open Source Packages

Podcast image

Published: 10/22/2024 16:00:00

Fran�ois Proulx - Arbitrary Code Execution 0-day in Build Pipeline of Popular Open Source Packages Episode Details

François Proulx shares his discovery of security vulnerabilities in build pipelines. Francois has found that attackers can exploit this often overlooked side of the software supply chain. To help address this, his team developed an open source scanner called Poutine that can identify vulnerable build pipelines at scale and provide remediation guidance. Francois has over 10 years of experience in building application security programs, he’s also the founder of the NorthSec conference in Montre...

Steve Wilson -- The Developer's Playbook for Large Language Model Security: Building Secure AI Applications

Podcast image

Published: 10/01/2024 10:00:00

Steve Wilson -- The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Episode Details

Steve Wilson, the author of 'The Developer's Playbook for Large Language Model Security’ is back to dive into topics from his book like AI hallucinations, trust, and the future of AI. Steve has been at the forefront of the explosion of activity at the intersection of AppSec, LLM, and AI. We discuss the biggest fears surrounding LLMs and AI, and explore advanced concepts like Retrieval Augmented Generation and prompt injection. Links: The Developer’s Playbook for Large Language Model Sec...

Jeff Williams -- Application Detection & Response (ADR)

Podcast image

Published: 09/24/2024 07:00:00

Jeff Williams -- Application Detection & Response (ADR) Episode Details

Jeff Williams, a renowned pioneer in the field of application security is with us to discuss Application Detection and Response (ADR), detailing its potential to revolutionize security in production environments. Jeff shares stories from his career, including the founding of OWASP, and his take on security assurance. We cover many topics including; security assurance, life, basketball and plenty of AppSec as well. Where to find Jeff: LinkedIn: https://www.linkedin.com/in/planetlev...

Phillip Wylie -- Pen Testing from Somebody who Knows about Pen Testing

Podcast image

Published: 09/17/2024 07:00:00

Phillip Wylie -- Pen Testing from Somebody who Knows about Pen Testing Episode Details

Philip Wiley shares his unique journey from professional wrestling to being a renowned pen tester. We define pen testing and the role of social engineering in ethical hacking. We talk tools of the trade, share a favorite web app pentest hack and offer good advice on starting a career in cybersecurity. Philip shares some insights from his book, ‘The Pentester Blueprint: Starting a Career as an Ethical Hacker.’ And we discuss the impact of AI on pen testing and where this field is headed in the...

Steve Springett -- Software and System Transparency

Podcast image

Published: 08/29/2024 07:00:00

Steve Springett -- Software and System Transparency Episode Details

Steve Springett, an expert in secure software development and a key figure in several OWASP projects is back. Steve unpacks CycloneDX and the value proposition of various BOMs. He gives us a rundown of the BOM landscape and unveils some new BOM projects that will continue to unify the security industry. Steve is a seasoned guest of the show so we learn a bit more about Steve's hobbies, providing a personal glimpse into his life outside of technology. Links from this episode: https://c...

Irfaan Santoe -- The Power of Strategy in AppSec

Podcast image

Published: 07/31/2024 07:00:00

Irfaan Santoe -- The Power of Strategy in AppSec Episode Details

Irfaan Santoe joins us for an in-depth discussion on the power of strategy in Application Security. We delve into measuring AppSec maturity, return on investment, and communicating technical needs to business leaders. Irfaan shares his unique journey from consulting to becoming an AppSec professional, and addresses the gaps between CISOs and AppSec knowledge. Irfaan shares valuable insights for scaling AppSec programs and aligning them with business objectives. FOLLOW OUR SOCIAL MEDIA: ...

Andrew Van Der Stock -- The New OWASP Top Ten

Podcast image

Published: 07/23/2024 07:00:00

Andrew Van Der Stock -- The New OWASP Top Ten Episode Details

Andrew Van Der Stok, a leading web application security specialist and executive director at OWASP joins us for this episode. We discuss the latest with the OWASP Top 10 Project, the importance of data collection, and the need for developer engagement. Andrew gives us the methodology behind building the OWASP Top 10, the significance of framework security, and much more. Previous episodes with Andrew Van Der Stock Andrew van der Stock — Taking Application Security to the Masses Andrew...

Derek Fisher -- Hiring in Cyber/AppSec

Podcast image

Published: 07/16/2024 07:00:00

Derek Fisher -- Hiring in Cyber/AppSec Episode Details

Derek Fisher, an expert in hardware, software, and cybersecurity with over 25 years of experience is back on the podcast. Derek shares his advice on cybersecurity hiring, specifically in application security, and dives into the challenges of entry-level roles in the industry. We discuss the value of certifications, the necessity of lifelong learning, and the importance of networking. Listen along for good advice on getting noticed in cybersecurity, resume tips, and the evolving landscape of A...

Tanya Janca -- Secure Guardrails

Podcast image

Published: 07/09/2024 07:00:00

Tanya Janca -- Secure Guardrails Episode Details

Tanya Janka, also known as SheHacksPurple, discusses secure guardrails, the difference between guardrails and paved roads, and how to implement both in application security. Tanya is an award-winning public speaker and head of education at SEMGREP and the best-selling author of ‘Alice and Bob Learn Application Security’. Tanya shares her insights on creating secure software and teaching developers in this episode. Mentioned in this episode: Tanya Janca – What Secure Coding Really Means&...

Jahanzeb Farooq -- Launching and executing an AppSec program

Podcast image

Published: 07/02/2024 07:00:00

Jahanzeb Farooq -- Launching and executing an AppSec program Episode Details

Jahanzeb Farooq discusses his journey in cybersecurity and the challenges of building AppSec programs from scratch. Jahanzeb shares his experience working in various industries, including Siemens, Novo Nordisk, and Danske Bank, highlighting the importance of understanding developer needs and implementing the right tools. The conversation covers the complexities of cybersecurity in the pharmaceutical and financial sectors, shedding light on regulatory requirements and the role of software in c...

David Quisenberry -- Building Security, People, and Programs

Podcast image

Published: 06/18/2024 07:00:00

David Quisenberry -- Building Security, People, and Programs Episode Details

David Quisenberry shares about his journey into the security world, insights on building AppSec programs in small to mid-sized companies, and the importance of data-driven decision-making. The conversation delves into the value of mentoring and why it's important to build real relationships with the people you work with, the vital role of trust with engineering teams, and the significance of mental health and community in the industry. Books Shared in the Episode: SRE Engineering by Bet...

Matt Rose -- Software Supply Chain Security Means Many Different Things to Different People

Podcast image

Published: 06/11/2024 07:00:00

Matt Rose -- Software Supply Chain Security Means Many Different Things to Different People Episode Details

Matt Rose, an experienced technical AppSec testing leader discusses his career journey and significant contributions in AppSec. The conversation delves into the nuances of software supply chain security and exploring how different perceptions affect its understanding. Matt provides insights into the XZ compromise, critiques the buzzword 'shift left,' and discusses the role of digital twins and AI in enhancing the supply chain security. He emphasizes the need for a comprehensive approach beyon...

James Berthoty -- Is DAST Dead? And the future of API security

Podcast image

Published: 05/31/2024 17:00:00

James Berthoty -- Is DAST Dead? And the future of API security Episode Details

James Berthoty, a cloud security engineer with a diverse IT background, discusses his journey into application and product security. James highlights his career trajectory from IT operations to cloud security, his experiences with security tools like Snyk and StackHawk, and the evolving landscape of Dynamic Application Security Testing (DAST) and API security. They delve into the practical challenges of CVEs, reachability analysis, and the complexities of patching in mid-sized companies. Jame...

Mark Curphey and Simon Bennetts -- Riding the Coat Tails of ZAP, without Open Source Funding

Podcast image

Published: 05/21/2024 07:00:00

Mark Curphey and Simon Bennetts -- Riding the Coat Tails of ZAP, without Open Source Funding Episode Details

Mark Curphey and Simon Bennetts, join Chris on the podcast to discuss the challenges of funding and sustaining major open source security projects like ZAP. Curphey shares about going fully independent and building a non-profit sustainable model for ZAP. The key is getting companies in the industry, especially companies commercializing ZAP, to properly fund its ongoing development and maintenance. Bennetts, who has led ZAP for over 15 years, shares the harsh reality that while ZAP is li...

Devin Rudnicki -- Expanding AppSec

Podcast image

Published: 05/14/2024 07:00:00

Devin Rudnicki -- Expanding AppSec Episode Details

Devon Rudnicki, the Chief Information Security Officer at Fitch Group, shares her journey of developing an application security program from scratch and advancing to the CISO role. She emphasizes the importance of collaboration, understanding the organization's business, and using metrics to drive positive change in the security program. Elon Musk - Walter Isaacson Steve Jobs - Walter Isaacson The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race - Walter Isaacson ...

Dustin Lehr -- Culture Change through Champions and Gamification

Podcast image

Published: 04/16/2024 04:00:00

Dustin Lehr -- Culture Change through Champions and Gamification Episode Details

Dustin Lehr, Senior Director of Platform Security/Deputy CISO at Fivetran and Chief Solutions Officer at Katilyst Security, joins Robert and Chris to discuss security champions. Dustin explains the concept of security champions within the developer community, exploring the unique qualities and motivations behind developers becoming security advocates. He emphasizes the importance of fostering a security culture and leveraging gamification to engage developers effectively. They also cover the ...

Francesco Cipollone -- Application Security Posture Management and the Power of Working with the Business

Podcast image

Published: 04/09/2024 04:00:00

Francesco Cipollone -- Application Security Posture Management and the Power of Working with the Business Episode Details

Francesco Cipollone, CEO of Phoenix Security, joins Chris and Robert to discuss security and explain Application Security Posture Management (ASPM). Francesco shares his journey from developer to cybersecurity leader, revealing the origins and importance of ASPM. The discussion covers the distinction between application security and product security, the evolution of ASPM from SIEM solutions, and ASPM's role in managing asset vulnerabilities and software security holistically. Francesco empha...

Mukund Sarma -- Developer Tools that Solve Security Problems

Podcast image

Published: 04/02/2024 04:00:00

Mukund Sarma -- Developer Tools that Solve Security Problems Episode Details

Mukund Sarma, the Senior Director for Product Security at Chime, talks with Chris about his career path from being a software engineer to becoming a leader in application security. He explains how he focuses on building security tools that are easy for developers to use and stresses the importance of looking at application security as a part of the broader category of product security. Mukund highlights the role of collaboration over security mandates and the introduction of security scorecar...

Meghan Jacquot -- Assumed Breach Red Team Engagements for AppSec

Podcast image

Published: 03/20/2024 04:00:00

Meghan Jacquot -- Assumed Breach Red Team Engagements for AppSec Episode Details

AppSec specialist Megan Jacquot joins Chris and Robert for a compelling conversation about community, career paths, and productive red team exercises. Megan shares her unique cybersecurity origin story, tracing her interest in the field from childhood influences through her tenure as an educator and her formal return to academia to pivot into a tech-focused career. She delves into her roles in threat intelligence and application security, emphasizing her passion for technical work, penetratio...

Bill Sempf -- Development, Security, and Teaching the Next Generation

Podcast image

Published: 03/12/2024 04:00:00

Bill Sempf -- Development, Security, and Teaching the Next Generation Episode Details

Robert is joined by Bill Sempf, an application security architect with over 20 years of experience in software development and security. Bill shares his security origins as a curious child immersed in technology, leading to his lifelong dedication to application security. They discuss CodeMash, a developer conference in Ohio, and recount Bill's presentation on the Veilid application framework, designed for privacy-driven mobile applications. Bill also explores his efforts in educating childre...

Hendrik Ewerlin -- Threat Modeling of Threat Modeling

Podcast image

Published: 03/05/2024 04:00:00

Hendrik Ewerlin�-- Threat Modeling of Threat Modeling Episode Details

Robert and Chris talk with Hendrik Ewerlin, a threat modeling advocate and trainer. Hendrik believes you can threat model anything, and he recently applied threat modeling to the process of threat modeling itself. His conclusions are published in the document Threat Modeling of Threat Modeling, where he aims to help practitioners, in his own words, "tame the threats to the threat modeling process." They explore the role of threat modeling in software development, emphasizing the dire conseq...

Jason Nelson -- Three Pillars of Threat Modeling Success: Consistency, Repeatability, and Efficacy

Podcast image

Published: 02/27/2024 04:00:00

Jason Nelson -- Three Pillars of Threat Modeling Success: Consistency, Repeatability, and Efficacy Episode Details

Jason Nelson, an accomplished expert in information security management, joins Chris to share insights on establishing successful threat modeling programs in data-intensive industries like finance and healthcare. Jason presents his three main pillars to consider when establishing a threat modeling program: consistency, repeatability, and efficacy. The discussion also provides a series of fascinating insights into security practices, regulatory environments, and the value of a threat modeling ...

Erik Cabetas -- Cracking Codes on Screen and in Contests: An Expert's View on Hacking, Vulnerabilities, and the Evolution of Cybersecurity Language

Podcast image

Published: 02/17/2024 04:00:00

Erik Cabetas -- Cracking Codes on Screen and in Contests: An Expert's View on Hacking, Vulnerabilities, and the Evolution of Cybersecurity Language Episode Details

Erik Cabetas joins Robert and Chris for a thought-provoking discussion about modern software security. They talk about the current state of vulnerabilities, the role of memory-safe languages in AppSec, and why IncludeSec takes a highly systematic approach to security assessments and bans OWASP language. Along the way, Erik shares his entry into cybersecurity and his experience consulting about hacking for TV shows and movies. The conversation doesn't end before they peek into threat modeling,...

Justin Collins -- Enabling the Business to Move Faster, Securely

Podcast image

Published: 02/06/2024 04:00:00

Justin Collins�-- Enabling the Business to Move Faster, Securely Episode Details

Justin Collins of Gusto joins Robert and Chris for a practical conversation about running security teams in an engineering-minded organization. Justin shares his experience leading product security teams, the importance of aligning security with business goals, and the challenges arising from the intersection of product security and emerging technologies like GenAI. They also discuss the concept of security partners and the future of AI applications in the field of cybersecurity. And he does...

Kyle Kelly -- The Dumpster Fire of Software Supply Chain Security

Podcast image

Published: 01/30/2024 04:00:00

Kyle Kelly -- The Dumpster Fire of Software Supply Chain Security Episode Details

Kyle Kelly joins Chris to explore the wild west of software supply chain security. Kyle, author of the CramHacks newsletter, sheds light on the complicated and often misunderstood world of software supply chain security. He brings unique insights into the challenges, issues, and potential solutions in this constantly growing field. From his experiences in sectors like cybersecurity and security research, he adapts a critical perspective on the state of the software supply chain, suggesting it...

Chris Hughes -- Software Transparency

Podcast image

Published: 01/20/2024 16:00:00

Chris Hughes -- Software Transparency Episode Details

Chris Hughes, co-founder of Aquia, joins Chris and Robert on the Application Security Podcast to discuss points from his recent book Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, co-authored with Tony Turner. The conversation touches on the U.S. government in the software supply chain, the definition and benefits of software transparency, the concept of a software bill of materials (SBOM), and the growth of open-source software. The episode also covers...

Jay Bobo & Darylynn Ross -- App Sec Is Dead. Product Security Is the Future.

Podcast image

Published: 01/09/2024 04:00:00

Jay Bobo & Darylynn Ross -- App Sec Is Dead. Product Security Is the Future. Episode Details

Jay Bobo and Darylynn Ross from CoverMyMeds join Chris to explain their assertion that 'AppSec is Dead.' They discuss the differences between product and application security, emphasizing the importance of proper security practices and effective communication with senior leaders, engineers, and other stakeholders. Jay proposes that product security requires a holistic approach and cautions against the current state of penetration testing in web applications. Darylynn encourages AppSec enginee...

Eitan Worcel -- Is AI a Security Champion?

Podcast image

Published: 12/19/2023 04:00:00

Eitan Worcel -- Is AI a Security Champion? Episode Details

Eitan Worcel joins the Application Security Podcast, to talk automated code fixes and the role of artificial intelligence in application security. We start with a thought-provoking discussion about the consistency and reliability of AI-generated responses in fixing vulnerabilities like Cross-Site Scripting (XSS). The conversation highlights a future where AI on one side writes code while AI on the other side fixes it, raising questions about the outcomes of such a scenario. The discussion sh...

Björn Kimminich -- OWASP Juice Shop

Podcast image

Published: 12/12/2023 04:00:00

Bj�rn Kimminich -- OWASP Juice Shop Episode Details

Bjorn Kimminich, the driving force behind the OWASP Juice Shop project, joins Chris and Robert to discuss all things Juice Shop. The OWASP Juice Shop is a deliberately vulnerable web application that serves as an invaluable training tool for security professionals and enthusiasts. Bjorn provides a comprehensive overview of the latest features and challenges introduced in the Juice Shop, underscoring the project's commitment to simulating real-world security scenarios. Key highlights include ...

Arshan Dabirsiaghi -- Security Startups, AI Influencing AppSec, and Pixee/Codemodder.io

Podcast image

Published: 12/05/2023 04:00:00

Arshan Dabirsiaghi -- Security Startups, AI Influencing AppSec, and Pixee/Codemodder.io Episode Details

Arshan Dabirsiaghi of Pixee joins Robert and Chris to discuss startups, AI in appsec, and Pixee's Codemodder.io. The conversation begins with a focus on the unrealistic expectations placed on developers regarding security. Arshan points out that even with training, developers may not remember or apply security measures effectively, especially in complex areas like deserialization. This leads to a lengthy and convoluted process for fixing security issues, a problem that Arshan and his team hav...

Dr. Jared Demott -- Cloud Security & Bug Bounty

Podcast image

Published: 11/28/2023 04:00:00

Dr. Jared Demott -- Cloud Security & Bug Bounty Episode Details

Chris and Robert are thrilled to have an insightful conversation with Dr. Jared Demott, a seasoned expert in the field of cybersecurity. The discussion traverses a range of topics, from controversial opinions on application security to the practical aspects of managing bug bounty programs in large corporations like Microsoft. We dive into the technicalities of bug bounty programs, exploring how companies like Microsoft handle the influx of reports and the importance of such programs in a com...

Katharina Koerner -- Security as Responsible AI

Podcast image

Published: 11/20/2023 19:00:00

Katharina Koerner -- Security as Responsible AI Episode Details

Dr. Katharina Koerner, a renowned advisor and community builder with expertise in privacy by design and responsible AI, joins Chris and Robert to delve into the intricacies of responsible AI in this episode of the Application Security Podcast. She explores how security intersects with AI, discusses the ethical implications of AI's integration into daily life, and emphasizes the importance of educating ourselves about AI risk management frameworks. She also highlights the crucial role of AI se...

Ray Espinoza -- The AppSec CISO, Vendor Relationships, and Mentoring

Podcast image

Published: 11/15/2023 04:00:00

Ray Espinoza -- The AppSec CISO, Vendor Relationships, and Mentoring Episode Details

For Security Pros & Business Leaders | Strategic Insights & Leadership Lessons 🔒🌟 When Ray Espinoza joined Chris and Robert on the Application Security Podcast, he gave a treasure trove of insights for both security professionals and business leaders alike! Whether you're deep in the trenches of information security or steering the ship in business leadership, this episode is packed with valuable takeaways. Dive in to discover why this is a must-listen for professionals across the sp...

Chris John Riley -- MVSP: Minimum Viable Secure Product

Podcast image

Published: 11/07/2023 04:00:00

Chris John Riley -- MVSP: Minimum Viable Secure Product Episode Details

Chris John Riley joins Chris and Robert to discuss the Minimum Viable Secure Product. MVSP is a minimalistic security checklist for B2B software and business process outsourcing suppliers. It was designed by a team that included experts from Google, Salesforce, Okta, and Slack. The MVSP objectives are targeted at startups and other companies creating new applications, helping such organizations meet security standards expected by larger enterprises like Google. The MVSP is designed to be acce...

Steve Wilson and Gavin Klondike -- OWASP Top Ten for LLM Release

Podcast image

Published: 10/31/2023 04:00:00

Steve Wilson and Gavin Klondike -- OWASP Top Ten for LLM Release Episode Details

Steve Wilson and Gavin Klondike are part of the core team for the OWASP Top 10 for Large Language Model Applications project. They join Robert and Chris to discuss the implementation and potential challenges of AI, and present the OWASP Top Ten for LLM version 1.0. Steve and Gavin provide insights into the issues of prompt injection, insecure output handling, training data poisoning, and others. Specifically, they emphasize the significance of understanding the risk of allowing excessive agen...

Tanya Janca -- What Secure Coding Really Means

Podcast image

Published: 10/24/2023 04:00:00

Tanya Janca -- What Secure Coding Really Means Episode Details

Tanya Janca, also known as SheHacksPurple, joins the Application Security Podcast again to discuss secure coding, threat modeling, education, and other topics in the AppSec world. With a rich background spanning over 25 years in IT, coding, and championing cybersecurity, Tanya delves into the essence of secure coding. Tanya highlights the difference between teaching developers about vulnerabilities and teaching them the practices to avoid these vulnerabilities in the first place. Instead of ...

Hasan Yasar -- Actionable SBOM via DevSecOps

Podcast image

Published: 10/16/2023 09:00:00

Hasan Yasar -- Actionable SBOM via DevSecOps Episode Details

Hasan Yasar believes that everyone shares the responsibility of creating a secure environment, and this can only be achieved by working collaboratively. He underscores the idea that security is not an isolated endeavor but a collective effort, urging everyone to come together and build a world where safety and security are paramount. Yasar also shares his thoughts about education and security. He highlights the need for integrating security concepts right from the foundational levels of teac...

Varun Badhwar -- The Developer Productivity Tax

Podcast image

Published: 10/10/2023 04:00:00

Varun Badhwar -- The Developer Productivity Tax Episode Details

Varun Badhwar is a three-time founder, a luminary in the cyber security industry, and a clear communicator. He joins Chris and Robert on the Application Security Podcast to discuss scanning with context, SBOM plus VEX, and the developer productivity tax. The concept of a "Developer Productivity Tax" acknowledges the challenges developers face when bombarded with a plethora of vulnerabilities. This "tax" represents the drain on developers' time and resources as they navigate through a myriad o...

OWASP Board of Directors Debate

Podcast image

Published: 10/03/2023 01:00:00

OWASP Board of Directors Debate Episode Details

The Application Security Podcast presents the OWASP Board of Directors Debate for the 2023 elections. This is a unique and engaging discussion among six candidates vying for a position on the board. Throughout the debate, candidates address pressing questions about their priorities as potential board members, the future direction of OWASP, and strategies for community growth and vendor neutrality. Topics such as vendor agnosticism, the allocation of profits from global OWASP events, and the i...

Itzik Alvas -- Secrets Security and Management

Podcast image

Published: 09/26/2023 04:00:00

Itzik Alvas -- Secrets Security and Management Episode Details

Itzik Alvas, Co-founder and CEO of Entro, is an expert on secrets security. Itzik joins Chris and Robert to discuss the significance of understanding and managing secrets, emphasizing the importance of knowing how many secrets an organization has, where they are located, and their potential impact. He elaborates on the three pillars of secrets management: listing and locating secrets, classifying and understanding their potential blast radius, and monitoring them for any abnormal behavior. T...

Harshil Parikh -- Deep Environmental and Organizational Context in Application Security

Podcast image

Published: 09/19/2023 04:00:00

Harshil Parikh -- Deep Environmental and Organizational Context in Application Security Episode Details

Harshil Parikh is a seasoned security leader with experience building security and compliance functions from the ground up. He notably built the security and compliance team at Medallia from scratch and led it through several transitions. He is also a conference speaker, and, most recently, he co-founded Tromzo. Harshil shares insights about AppSec, running a startup, selling effectively, and provides justification for his mantra, "Context is king." Harshil underscores the importance of und...

Jeff Williams -- The Tech of Runtime Security

Podcast image

Published: 09/12/2023 04:00:00

Jeff Williams -- The Tech of Runtime Security Episode Details

Jeff Willams of Contrast Security joins Chris and Robert on the Application Security Podcast to discuss runtime security, emphasizing the significance of Interactive Application Security Testing (IAST) in the modern DevOps landscape. After reflecting on the history of OWASP, the conversation turns to the challenges organizations face in managing their application security (AppSec) backlogs. Jeff highlights the alarming number of unresolved issues that often pile up, emphasizing the inefficien...

Mark Curphey and John Viega -- Chalk

Podcast image

Published: 09/05/2023 04:00:00

Mark Curphey and John Viega -- Chalk Episode Details

Mark Curphey and John Viega join Chris and Robert to explain the details of Chalk, Crash Override's new tool. Mark also talks about why ZAP departed from OWASP and joined the Software Security Project, highlighting some of the value and differences of both organizations. Open Source Software is important to the industry, but Mark calls on companies to contribute to the development and support of the projects they use. The conversation explores the challenges faced by companies, especially l...

Maril Vernon -- You Get What You Inspect, Not What You Expect

Podcast image

Published: 08/29/2023 04:00:00

Maril Vernon -- You Get What You Inspect, Not What You Expect Episode Details

Maril Vernon is passionate about Purple teaming and joins Robert and Chris to discuss the intricacies of purple teaming in cybersecurity. She underscores the significance of fostering a collaborative environment between developers and the security team. Drawing from her experiences, Maril shares the challenge of development overlooking her remediation recommendations. She chose to engage directly with the developers, understanding their perspective and subsequently learning to frame her remed...

Dan Küykendall -- Why All Application Security Products Suck

Podcast image

Published: 08/22/2023 04:00:00

Dan K�ykendall -- Why All Application Security Products Suck Episode Details

Dan Küykendall visits The Application Security Podcast to discuss his series "Why All AppSec Products Suck" and explain why software companies should understand the uses and limitations of any security tool. The series aims to highlight the limitations of each tool and to help users make informed decisions when selecting the right tools for their needs. In this field, there is no such thing as an expert; there is always something new to learn. Dan, Chris, and Robert remember the late Kevin Mi...

Kevin Johnson -- Samurai Swords and Zap's Departure

Podcast image

Published: 08/15/2023 04:00:00

Kevin Johnson -- Samurai Swords and Zap's Departure Episode Details

Kevin Johnson is the CEO of Secure Ideas. He began his career as a developer but turned toward security when he discovered that the interface for an intrusion detection system, Snort, was out of date. This led him to create BASE (Basic Analysis and Security Engine), a testament to Kevin's proactive approach. Kevin has a deep-rooted passion for open-source projects. He highlights the challenges and joys of initiating and sustaining such ventures, emphasizing the pivotal role of community cont...

Tony Quadros -- The Life of an AppSec Vendor

Podcast image

Published: 08/08/2023 04:00:00

Tony Quadros -- The Life of an AppSec Vendor Episode Details

Tony Quadros, the AppSec Lumberjack, shares the unique career path that led him to find his passion in Application Security. The discussion delves into the work of an AppSec vendor, with Tony explaining his role and the responsibilities it entails. He emphasizes the importance of understanding the needs and environment of the customer, and whether the product he represents can fulfill their requirements. Tony also shares his philosophy of sales, centered around solving problems and providing ...

Steve Giguere -- Cloud AppSec

Podcast image

Published: 07/23/2023 20:00:00

Steve Giguere -- Cloud AppSec Episode Details

Cloud security is on an evolutionary path, with newer platforms embracing secure-by-default settings. This has led to a significant improvement in security but also adds complexity as developers need to understand these defaults when deploying to the cloud. Steve Giguere defines cloud application security, describes cloud-first development and cloud complexity, security by default, and the need to broaden AppSec by creating new security personas and being secure from idea to destinatio...

Paul McCarty -- The Burrito Analogy of the Software Supply Chain

Podcast image

Published: 07/14/2023 08:00:00

Paul McCarty -- The Burrito Analogy of the Software Supply Chain Episode Details

"Visualizing the Software Supply Chain" is a project which aims to kick off a discussion about the scope and breadth of the software supply chain. Paul McCarty emphasizes the importance of understanding what's in the software supply chain to secure it effectively. He uses the burrito analogy, stating that you can't decide if you want to eat it if you don't know what's in it. We discuss the nuances around the Software Bill of Materials (SBOM) and the importance of understanding the differences...

Farshad Abasi -- Three Models for Deploying AppSec Resources

Podcast image

Published: 07/09/2023 18:00:00

Farshad Abasi -- Three Models for Deploying AppSec Resources Episode Details

Farshad Abasi shares three models for deploying resources within application security teams: The Dedicated AppSec Person Model involves assigning an AppSec person to work with each team. Farshad shares his experience of working with developers and the challenges faced in getting them to understand and implement threat modeling. He also discusses the transition from waterfall to Agile and how it affected threat modeling.The Federated Model: A security consultant attends weekly standups and spr...

Kim Wuyts -- The Future of Privacy Threat Modeling

Podcast image

Published: 06/29/2023 04:00:00

Kim Wuyts -- The Future of Privacy Threat Modeling Episode Details

Kim Wuyts discusses her work in privacy threat modeling with LINDDUN, a framework inspired by Microsoft's STRIDE for security threat modeling. LINDDUN provides a structure to analyze privacy threats across multiple categories such as linking, detecting data disclosure, and unawareness. The framework has been updated over the years to incorporate new knowledge and developments in privacy, and it has become recognized as a go-to approach for privacy threat modeling. Kim believes that privacy an...

François Proulx -- Actionable Software Supply Chain Security

Podcast image

Published: 06/22/2023 13:00:00

Franc?ois Proulx -- Actionable Software Supply Chain Security Episode Details

Software supply chain -- how deep does the problem go? François is here to help us realize how deep the rabbit hole of the supply chain is and enlighten us with strategies to get out of the hole. François emphasizes the importance of branch protection in source code repositories as the cornerstone of any supply chain, highlighting the need for peer review and static code analysis before merging. He also discusses the concept of tag protection, which prevents anyone with rewrite access to the...

Steve Wilson -- OWASP Top Ten for LLMs

Podcast image

Published: 06/15/2023 07:00:00

Steve Wilson -- OWASP Top Ten for LLMs Episode Details

How do we do security in the world of AI and LLMs? A great place to start is with an OWASP project tasked with creating a standardized guideline for building secure AI applications with large language models such as ChatGPT. Enter OWASP Top Ten for LLMs, and Steve Wilson, the project leader. You'll experience Large Language Models (LLMs) and their implications in AI. Steve explains how the introduction of ChatGPT marked a significant shift in the AI landscape. He elaborates on the concept of ...

JB Aviat -- The State of Application Security

Podcast image

Published: 06/07/2023 11:00:00

JB Aviat -- The State of Application Security Episode Details

What is the state of application security? JB Aviat answered that question, by creating the state of application security report based on data from Datadog customers using the application security and APM products. It provides insights into threat detection, vulnerability detection, prioritization, and general trends on where the most significant risks lie. We discuss: the prioritization of vulnerabilities;the risks associated with non-production environments like staging or pre-production. T...

Joshua Wells -- Application Security in the Age of Zero Trust

Podcast image

Published: 06/01/2023 11:00:00

Joshua Wells -- Application Security in the Age of Zero Trust Episode Details

What is zero trust, and how does it impact the world of applications and application security? We dive deep into zero trust with Joshua Wells, a seasoned cybersecurity expert with over ten years of experience. Joshua explores the intricacies of zero trust, a cybersecurity model that dictates no user or machine is trusted by default and must be authenticated every time. Listen in as Joshua discusses his journey from aspiring to be an NFL player to becoming a leading voice in cybersecurity. He ...

Jeevan Singh -- The Future of Application Security Engineers

Podcast image

Published: 05/15/2023 10:00:00

Jeevan Singh -- The Future of Application Security Engineers Episode Details

Jeevan Singh, the director of product security at Twilio, discusses the future of application security engineers. Singh highlights the importance of embedding security into all aspects of software development and the need for a strong security culture within organizations. He also explains the skills required for a senior application security engineer, such as application security, software development, and teaching skills. Singh underscores the importance of empathy and influence, emphasizin...

Tony Turner -- Threat Modeling and SBOM

Podcast image

Published: 05/03/2023 10:00:00

Tony Turner -- Threat Modeling and SBOM Episode Details

Have you ever considered using an SBOM to inform your threat modeling? Tony Turner has. Tony joins us to discuss SBOMs, threat modeling, and the importance of Cyber Informed Engineering. Tony delves into the SBOM (Software Bill of Materials) concept, highlighting their value proposition in identifying vulnerabilities, demonstrating compliance with software licenses, and informing M&A activities and incident response indicators related to cyberattacks. We also explore the integratio...

Christian Frichot -- Threat Modeling with hcltm

Podcast image

Published: 04/18/2023 16:00:00

Christian Frichot -- Threat Modeling with hcltm Episode Details

Christian Frichot, an AppSec hacker, security leader, and developer of hcltm. He discusses the DevOps threat modeling tool he dreamed up and built. The tech was created to fit into developers' workflows and leverage tools they are familiar with. hcltm is designed to drive valuable change and be updated and maintained easily by software engineers. It is a developer-centric software product not heavily opinionated on diagramming, allowing users to employ their preferred methods for threat model...

Zohar Shachar -- Bug Bounty from Both Sides

Podcast image

Published: 04/03/2023 11:00:00

Zohar Shachar -- Bug Bounty from Both Sides Episode Details

Zohar Shachar joins us to discuss the bug bounty process from both sides. Zohar has spent time as a bug bounty hunter and shares wisdom on avoiding bug bounty-causing issues for your AppSec posture. We hope you enjoy this conversation with...Zohar Shachar. FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast ➜LinkedIn: The Application Security Podcast ➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Sarah-jane Madden -- Threat Modeling to established teams

Podcast image

Published: 03/23/2023 07:00:00

Sarah-jane Madden -- Threat Modeling to established teams Episode Details

Sarah-Jane Madden is the Chief Information Security Officer of Sensing Technology Group. - part of Fortive. She has over 20 years of software experience, from the most formal environments to ‘let’s fix it in production’ type teams. She has been a longtime advocate of deliberate application security as a partnership with product management and believes security does not have to be an overhead. Sarah-Jane joins us to discuss her talk at OWASP Dublin, "Far from green fields — introducing Threat ...

Jet Anderson -- The AppSec Code Doctor

Podcast image

Published: 03/16/2023 07:00:00

Jet Anderson -- The AppSec Code Doctor Episode Details

Jet Anderson's passion is teaching today's software developers to write secure code as part of modern DevOps pipelines, at speed and scale, without missing a beat. He's been a software engineer for over 25 years and believes fixing security bugs is better than finding them. Jet joins us to discuss software or security engineer first, how fixing security bugs is better than just finding them, and the Code Doctor security training program he built and deployed. We hope you enjoy this conversati...

James Mckee -- Developer Security

Podcast image

Published: 03/09/2023 07:00:00

James Mckee -- Developer Security Episode Details

James Mckee is a developer (MCPDEA) and security advocate (CISSP) whose biggest responsibility is leading developer security practices. He sets the standards and procedures for the practice's operations and leads all client engagement efforts concerning security. He also takes the lead in ensuring that company staff (developers specifically) are properly trained and following best practices concerning application security. Currently, he is responsible for training and providing product guidan...

Derek Fisher -- The Application Security Handbook

Podcast image

Published: 03/02/2023 07:00:00

Derek Fisher -- The Application Security Handbook Episode Details

Derek is the author of “The Application Security Handbook.” He is a university instructor at Temple University, where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led security teams, large and small, at organizations in the healthcare and financial industries. Derek joins us to unpack the goals of an application security program, what is cutting edge in application security programs today, the rol...

Rob van der Veer -- OWASP AI Security & Privacy Guide

Podcast image

Published: 02/23/2023 10:00:00

Rob van der Veer -- OWASP AI Security & Privacy Guide Episode Details

Rob van der Veer has a 30-year background in software engineering, building AI businesses, creating software, and assessing software. He is a senior director at the Software Improvement Group, where he established practices for AI, security, and privacy. Rob is involved in several standardization initiatives like OWASP SAMM, ENISA, CIP, and AI security & privacy guide. He leads the writing group for the new ISO standard on AI engineering: 5338. Rob co-leads the OWASP integration project, ...

Robyn Lundin -- Planning & organizing a penetration test as an AppSec team

Podcast image

Published: 01/10/2023 07:00:00

Robyn Lundin -- Planning & organizing a penetration test as an AppSec team Episode Details

Robyn Lundin started working in tech after a coding boot camp as a developer for a small startup. She then discovered her passion for security, pivoted into pentesting for NCC Group, and now works as a Senior Product Security Engineer for Slack. Robyn joins us to discuss the role of penetration testing within the application security realm. Robyn provides actionable guidance you can apply directly to your application pen testing program. We hope you enjoy this conversation with....Roby...

Michael Bargury -- Low Code / No Code Security and an OWASP Top Ten

Podcast image

Published: 01/03/2023 07:00:00

Michael Bargury -- Low Code / No Code Security and an OWASP Top Ten Episode Details

Michael Bargury is the Co-Founder and CTO of Zenity, where he helps companies secure their low-code/no-code apps. In the past, he headed security product efforts at Azure, focused on IoT, APIs and IaC. Michael is passionate about all things related to cloud, SaaS and low-code security and spends his time finding ways they could go wrong. He also leads the OWASP low-code security project and writes about it on DarkReading. Michael is a regular speaker at OWASP, BSides and DEFCON confere...

Alex Olsen -- Security champions, empowering developers, and AppSec training

Podcast image

Published: 12/20/2022 07:00:00

Alex Olsen -- Security champions, empowering developers, and AppSec training Episode Details

Alex leads the Cyber Security Consulting Group, part of Rakuten's Cyber Security Defense Department. The group's dedication is to providing global security services, including security architecture, DevSecOps tooling and integration services, delivery of technical training, and running Rakuten's Security Champion community. His focus is on empowering teams to improve security throughout the development lifecycle. Alex joins us to discuss security champions, a topic near and dear to our heart...

Mark Curphey -- The future of OWASP

Podcast image

Published: 12/13/2022 07:00:00

Mark Curphey -- The future of OWASP Episode Details

Mark Curphey is one of the creators of OWASP from the very early days. Mark worked in the background over the few decades of OWASP but has recently taken more to the spotlight. After running, he was elected and joined the OWASP Board of Directors. This conversation starts with the historical story of Mark and his history with OWASP. Then we jump into the visions for OWASP in the future and the plans in place to reach those goals. We hope you enjoy this conversation with...Mark Curphey. ...

Tiago Mendo -- How to scan at scale with OWASP ZAP

Podcast image

Published: 12/06/2022 06:00:00

Tiago Mendo -- How to scan at scale with OWASP ZAP Episode Details

Tiago Mendo is a co-founder and CTO of Probely. He has extensive experience in pentesting applications, training, and providing all-around security consultancy. Tiago started working with security in the early 2000s, beginning with a tenure of 12 years at Portugal Telecom. While there, he built the web security team and worked with 150+ developers. He holds a Master's in Information Technology/Information Security from Carnegie Mellon University and a CISSP certification. He is ...

Wolfgang Goerlich -- Security beyond vulnerabilities

Podcast image

Published: 11/29/2022 07:00:00

Wolfgang Goerlich -- Security beyond vulnerabilities Episode Details

J. Wolfgang Goerlich is an Advisory CISO for Cisco Secure. He has been responsible for IT and IT security in the healthcare and financial services verticals. Wolfgang has led advisory and assessment practices for cybersecurity consulting firms. Wolf joins us to talk about some security things that will stretch your mind, like security beyond vulnerabilities, how apps intended functionality can be misused, data privacy, and nudges and behavior science. Wolf challenged my thinking...

Sam Stepanyan -- OWASP Nettacker Project

Podcast image

Published: 11/08/2022 07:00:00

Sam Stepanyan -- OWASP Nettacker Project Episode Details

Sam Stepanyan is an OWASP London Chapter Leader and an Independent Application Security Consultant with over 20 years of IT experience and a background in software engineering and web application development. Sam has worked for various financial services institutions in the City of London, specializing in Application Security consulting, Secure Software Development Lifecycle (SDLC), developer training, source code reviews and vulnerability management. He is also a Subject Matter Expert...

Nick Aleks and Dolev Farhi -- GraphQL Security

Podcast image

Published: 11/01/2022 12:00:00

Nick Aleks and Dolev Farhi -- GraphQL Security Episode Details

Dolev Farhi is a security engineer and author with extensive experience leading security engineering teams in complex environments and scales in the Fintech and cyber security industries. Currently, he is the Principal Security Engineer at Wealthsimple. He is one of the founders of DEFCON Toronto (DC416). He enjoys researching vulnerabilities in IoT devices, participating in and building CTF challenges and contributing exploits to Exploit-DB. Nick Aleks is a leader in Toronto's cybersecurity ...

Guy Barhart-Magen -- Log4j and Incident Response

Podcast image

Published: 09/23/2022 08:00:00

Guy Barhart-Magen -- Log4j and Incident Response Episode Details

With nearly 25 years of experience in the cyber-security industry, Guy held various positions in both corporates and startups. In his role as the CTO for the cyber crisis management firm Profero, his focus is making incident response fast and scalable, harnessing the latest technologies and a cloud-native approach. Guy is the BSidesTLV chairman and CTF lead, a Public speaker in well-known global security events (SAS, t2, 44CON, BSidesLV, and several DefCon villages, to name a few), and the re...

Brett Smith -- Security is a Necessary Evil

Podcast image

Published: 08/30/2022 13:00:00

Brett Smith -- Security is a Necessary Evil Episode Details

Brett Smith is a Software Architect/Engineer/Developer with 20+ years of experience. Specialties: Automation, Continuous Integration/Delivery/Testing/Deployment Expertise: Linux, packaging, and tool design. Brett joins us to discuss why he hates security and shares his vast knowledge of building a secure and cutting-edge build pipeline. We hope you enjoy this conversation with...Brett Smith. FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast ➜LinkedIn: The Application Security Podcast ➜Y...

Chen Gour-Arie -- The AppSec Map

Podcast image

Published: 08/16/2022 09:00:00

Chen Gour-Arie -- The AppSec Map Episode Details

Chen Gour-Arie is the Chief Architect and Co-Founder of Enso Security. With over 15 years of hands-on experience in cybersecurity and software development, Chen demonstrably bolstered the software security of dozens of global enterprise organizations across multiple industry verticals. An enthusiastic builder, he has focused his career on building tools to optimize and accelerate security testing and all related workflows. Ken joins us to introduce the AppSec Map and provides a live demo of t...

Dominique Righetto -- OWASP Secure Headers

Podcast image

Published: 08/09/2022 10:00:00

Dominique Righetto -- OWASP Secure Headers Episode Details

Dominique Righetto is an AppSec enthusiast and OWASP projects contributor. Dominique joins us to discuss the OWASP Secure Headers project. We discuss headers at a high level and then dive into all the goodies you'll find within the project, from awareness, guidance, and a test suite that can be integrated into your CI/CD pipeline to test your security headers. We hope you enjoy this conversation with...Dominique Righetto. FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast ➜LinkedIn: The Applic...

Hillel Solow -- How to do AppSec without a security team

Podcast image

Published: 07/25/2022 09:00:00

Hillel Solow -- How to do AppSec without a security team Episode Details

Hillel Solow is Chairman of the Board at ProtectOnce, where he helps guide product and security strategy. Hillel is a serial entrepreneur in the cybersecurity space, but his favorite thing is still writing code at 2 am. Hillel joins us to discuss how to do appsec without a security team. We explore the building blocks of an appsec program, and what appsec looks like for companies of different sizes, from startup to midsize to enterprise. Then dive into Hillel's most important advi...

Chris Romeo -- The Security Journey Story

Podcast image

Published: 06/02/2022 13:00:00

Chris Romeo -- The Security Journey Story Episode Details

In this episode of the Application Security Podcast, Chris Romeo walks through the origin story of Security Journey and shares some experiences taking a security startup from bootstrap to acquisition. Chris talks about how and why he started the company, what defining factors made Security Journey successful and why they're being acquired now. He ends by giving an overview of what to expect from Security Journey moving forward. We hope you enjoy this conversation with…Chris Romeo. Check out ...