Twitter (/SecurityJourney) LinkedIn (/company/security-journey) YouTube (/c/securityjourney) Online () CONTACT: 44 min The Security Champions Framework (hosted on GitHub) Using the Security Champions Framework to Optimize Your Security Program~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Welcome to The Security Champions Podcast Starting Cisco’s Security Champions Program The Year of Security Champions The Security Champions Framework Biggest Security Champion Program Mistakes Growing a Program from Day 1 Episode Resources: Twitter (/SecurityJourney) LinkedIn (/company/security-journey) YouTube (/c/securityjourney) Online () CONTACT: 50 minĬhris Romeo, AppSec expert and CEO of Kerr Ventures, joins to talk about The Security Champions Framework and the biggest mistake organizations make with security champion programs. Mastering Elegant Code Part 1: Advantages and Security Benefits of Elegant CodeMastering Elegant Code Part 2: 6 Techniques for Writing Elegant Code ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Welcome to The Security Champions Podcast Takeaways from the SolarWinds Breach The Structure of Elegant Code When to Implement Elegant Code Prioritization of Mitigating Vulnerabilities Unifying Security and Development Episode Resources: Tim joins to discuss the concept of elegant code and the impact elegant coding can have on an organization's security. With over 25 years of experience and 18 issued patents on security-related topics, Tim is a trusted advisor for business executives, AppSec leaders, and the White House. Tim Brown is the CISO of SolarWinds, responsible for overseeing the company's internal IT security, product security, and security strategy. Twitter (/SecurityJourney) LinkedIn (/company/security-journey) YouTube (/c/securityjourney) Online () CONTACT: 30 min Secure Coding Practices – Growing Success or Zero-Day Epidemic? January 2023 EMA Research Report.Security Champions Role in Secure Coding.Communicating the Importance of Secure Coding.Welcome to The Security Champions Podcast. Ken joins to discuss the human side of secure coding, the important elements of secure coding practices, and how to teach a security mindset. With over 15 years of experience, Ken is an author on cybersecurity topics and has spent several years working for federal contractors in cybersecurity practitioner roles. Kenneth Buckler, CASP, is a research analyst of information security/risk and compliance management for Enterprise Management Associates, a technology industry analyst and consulting firm. Twitter (/SecurityJourney) LinkedIn (/company/security-journey) YouTube (/c/securityjourney) Online () CONTACT: 52 min Learn more at .įOLLOW US to stay up-to-date with new content! Podcast sponsored by Security Journey, Secure Coding Training for Developers and Everyone in the SDLC. The Security Champion Program Success Guide Let's Talk Software Security! - An online group where Dustin and others share tips, tricks, and ideas for making DevSecOps, Shift Left, and Security By Design concepts work efficiently for organizations.~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Welcome to The Security Champions Podcast The Security Champion Program Success Guide Gamification for Learning Insights from Fivetran's Program What is a Security Champion? Proving the ROI of Security Champions Bridging the Security and Development Divide Episode Resources: He joins us to discuss The Security Champion Program Success Guide and the inner workings of Fivetran's security champion program. Before shifting into cybersecurity leadership, Dustin spent 13 years as a software engineer and application architect in various industries. Director of Platform Security at Fivetran & the Co-founder and Chief Solutions Officer at Katilyst Security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |