Episodes List
Jannik Hollenbach — Multijuicer: JuiceShop with a side of Kubernetes
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Sebastien Deleersnyder and Bart De Win — OWASP SAMM
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Marc French, Steve Lipner, Maya Kaczorowski, DJ Schleen, Kim Wuyts — Season Six Wrap up
We’ve reached the end of season six, and here are a few of our favorite clips. Season seven is around the corner.
- S06E01 — Marc French — The AppSec CISO
- What are some tips for someone who wants to become a CISO? Is there such a thing as a CISO school?
- S06E05 — Steve Lipner — The Past, Present, and Future of SDL
- Lipner is a giant in the industry and someone that I’ve looked up to for years. After some setup, I ask him for a definition of SDL.
- S06E08 — Maya Kaczorowski — Container and Orchestration Security
- Containers are not a security tool. Do you agree or disagree? The philosophy of container security.
- S06E10 — DJ Schleen — DevOps: The Sec is Silent
- DevOps/DevSecOps Unicorns.
- S06E15 — Kim Wuyts — Privacy Threat Modeling
- We walk through the LINDUN privacy threat modeling framework, step by step.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Mark Merkow — Secure, Resilient, and Agile Software Development
Mark Merkow works at WageWorks in Tempe, Arizona, leading application security architecture and engineering efforts in the office of the CISO.
Mark has over 40 years of experience in IT in a variety of roles, including application development, systems analysis, and design, security engineering, and security management. Mark has authored or co-authored 17 books on IT and has been a contributing editor to four others.
Mark joins us to discuss how application security and Agile software development methodology fit together. We hope you enjoy this conversation with… Mark Merkow.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Zsolt Imre — Fuzz testing is easy
Zsolt is the founder and CTO of GUARDARA with more than 15 years of experience in cybersecurity, both on the offensive and defensive side. Zsolt explains fuzz testing, who does it, and why. He also helps us to understand how to deal with fuzz testing results, and how to get started doing fuzz testing on your own. We hope you enjoy this conversation with … Zolt Imre.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Adam Shostack — Remote Threat Modeling
Adam joins us to discuss remote threat modeling, and we do a live threat modeling exercise to figure out how remote threat modeling actually works. If you want to see the screen share as we figure out remote threat modeling, check out the Youtube version of the episode.
Bio: Adam Shostack is a leading expert on threat modeling, and consultant, entrepreneur, technologist, author and game designer. He has taught threat modeling at a wide range of commercial, non-profit and government organizations. He’s a member of the Black Hat Review Board, is the author of Threat Modeling: Designing for Security, and the co-author of The New School of Information Security.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Kim Wuyts — Privacy Threat Modeling
Kim Wuyts is a postdoctoral researcher at the Department of Computer Science at KU Leuven (Belgium). She has more than 10 years of experience in security and privacy in software engineering. Kim is one of the main forces behind the development and extension of LINDDUN, a privacy threat modeling framework that provides systematic support to elicit and mitigate privacy threats in software systems. Kim joins us to explain the difference between security and privacy and introduce us to LINDDUN and how to use it.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
John Martin — Preventing a Cyberpocalypse
John Martin has owned responsibilities ranging from Software Supply Chain to DevSecOps Security Champions to Cloud Security Monitoring. His career spans the years between Blue-Box MF generators, through the era of automated hacks, and into our modern age of industrialized paranoia. He is a frequent speaker on the topic of commercial software security and a contributor to many SAFECode and CSA efforts. John joins us to discuss the prevention of a cyberpocalypse. You heard it correctly. Now tune in to learn what a cyberpocalypse is and why you need to care about it. We hope you enjoy this conversation with John Martin.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Jeremy Long — It’s dependency check, not checker
Jeremy Long is a principal engineer specializing in securing the SDLC. Jeremy is the founder and project lead for the OWASP dependency-check project; a software composition analysis tool that identifies known vulnerable 3rd party libraries. Jeremy joins us to share the origin story of dependency check, the problems it solves, the number of companies that use it, how to integrate it, and the future of the project.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Alyssa Miller — Experiences with DevOps + Automation and beyond
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Vandana Verma — Support each other
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
DJ Schleen — DevOps: The Sec is Silent
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Niels Tanis — 3rd Party Risk in a .NET World
Niels Tanis has a background in .NET development, pen-testing, and security consultancy. He has experience breaking, defending and building secure applications. Neils joins us to continue our .NET conversation from last year. This time around we focus on the 3rd party risk we pull into our applications by using third party libraries in a .NET world.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Maya Kaczorowski — Container and Orchestration Security
Maya is a Product Manager in Security & Privacy at Google, focused on container security. She previously worked on encryption at rest and encryption key management. Maya has a Master’s in mathematics, focusing on cryptography and game theory. Maya joins us to discuss how containers improve security, a high-level threat model of containers and orchestration, and tips for enhancing security as you role out containers and Kubernetes.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Geoff Hill — AppSec, DevSecOps, and Diplomacy
Geoffrey Hill is an AppSec DevSecOps leader and Architect. Geoff joins us to discuss his experiences rolling out DevSecOps in both Agile and non-Agile practicing shops. We hope you enjoy this conversation with…Geoff Hill.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Erez Yalon — The OWASP API Security Project
Erez Yalon heads the security research group at Checkmarx. With vast defender and attacker experience and as an independent security researcher, he brings invaluable knowledge and skills to the table. Erez joins us to speak about the new OWASP API Security Project, and more specifically, the new API Security Top 10. We hope you enjoy this conversation with … Erez Yalon.
Find the Document on the OWASP GitHub: https://github.com/OWASP/API-Security
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Steve Lipner — The Past, Present, and Future of SDL
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
David Kosorok — The Three Pillars of an AppSec Program: Prevent, Detect, and React
David Kosorok is a code security expert, software tester, father of 9, and a self-described major nerd. David is the Director of AppSec at Align Tech, and a fellow member of the Raleigh Durham tech community. David joins us to speak about the three pillars of building an application security program: Prevent, Detect, and React. When we think the program, we’ve never heard anyone relate a program this way, and thought you needed to hear about a different approach to program building. We hope you enjoy this conversation with…. David Kosorok.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Chris and Robert: A Taste of Hi-5
As the hosts of the Application Security Podcast, we get the opportunity from time to time to mix it up. This week we gather a few security articles, share a summary, and offer our opinions (for what our opinions are worth). The source of the articles is Hi-5, a weekly newsletter containing five security articles that are worth your time. We scour the Interwebs looking for the best articles on application and product security and share those with you. You can subscribe to Hi-5 on the Security Journey website.
Hit us up on Twitter and let us know if you like this format and if we should do more of this type of content. We hope you enjoy this episode with, Chris and Robert.
These are the articles:
Interest In Secure Design Practices Is Increasing Leading To Two Predictions
Developers mentoring other developers: practices I’ve seen work well
7 Web Application Security Best Practices
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Bill Dougherty — INCLUDES NO DIRT, practical threat modeling for healthcare and beyond
Bill Dougherty is the vice president of IT and security at Omada Health, where he leads a team responsible for all aspects of internal IT including SaaS strategy, end-user support, vendor management, operational security and compliance. Bill along with Patrick Curry created the INCLUDES NO DIRT approach to threat modeling, which takes threat modeling to the next level, beyond STRIDE, and goes head on with a more modern set of real-world security considerations. We hope you enjoy this conversation with, Bill Dougherty.
Find Bill on Twitter @bdognet.
For an article about the methodology, see INCLUDES NO DIRT: A Practical Threat Modeling Approach for Digital Healthcare and Beyond
For the paper that describes the methodology and how to implement, see INCLUDES NO DIRT
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Marc French — The AppSec CISO
Marc French is a security person, firearms geek, scuba guy, lousy golfer, and an aspiring blacksmith. We met Marc in the hallway at the Boston Application Security Conference. Marc has extensive experience as a CISO but came from the world of AppSec to the exec suite, which is not the normal path. We discuss what is a CISO, and what does a CISO actually do, the role of AppSec in the life of the CISO, and tips Marc has for those that wish to become a CISO someday. We hope you enjoy this conversation with Marc French.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Season 5 Finale — A cross section of #AppSec
Threat modeling, secrets, mentoring, self-care, program building, and much more. Clips from Georgia Weidman, Simon Bennetts, Izar Tarandach, Omer Levi Hevroni, Tanya Janca, Björn Kimminich, Caroline Wong, Adam Shostack, Steve Springett, Matt McGrath, Brook Schoenfield, and Ronnie Flathers.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Ronnie Flathers — Security programs big and small
Ronnie Flathers is a security guy, a pentester, and a researcher. In this conversation, we explore his experiences in building application security programs. He’s had the opportunity to program build inside of companies big and small.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Brook Schoenfield — Security is a messy problem
Brook Schoenfield is a Master Security Architect @IOActive and author of Securing Systems, as well as an industry leader in security architecture and threat modeling, and a friend.
“We have a static analysis tool. Why do we need a program?” This is what Brook overheard at one point in his past, from a company CTO, and it sums up the program issue. The CTO was trying to drive a technical strategy for an entire company, and security was just one piece of that. A mandate or a tool would have made life so easy.
Brook takes us on a journey based on his experience building programs, with advice, stories, comments, and quotes. We talk about architecture, culture, mindset, tools, compilers and so much more.
Catch Brook’s next book, “Secrets of a Cyber Security Architect” which arrives in Fall 2019.
Here is Brook’s first book on Amazon: Securing Systems: Applied Security Architecture and Threat Models
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Liran Tal — The state of open source software security
Liran Tal is a Developer Advocate @snyksec and is the author of Essential Node.js Security. He takes #opensource and protecting the #web very seriously.
Podcast: Play in new window | Download
Subscribe: Apple Podcasts | Google Podcasts | Spotify | iHeartRadio | Stitcher | Email | TuneIn | RSS | More
Subscribe Now
Ready to Discover the Latest in AppSec? The Best Part? It's Free to Listen!
Or subscribe with your favorite app by using the address below: https://podcast.securityjourney.com/feed/podcast/