Submit Search
Upload
It’s Time to Treat Software Engineers as Security Evangelists
•
0 likes
•
448 views
Darren Hickling MBCS
Follow
Presentation given during the Enterprise Security and Risk Management conference 2018.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 22
Download now
Download to read offline
Recommended
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet
What does Glen Tupling do?
What does Glen Tupling do?
gtupling
Stu r35 a
Stu r35 a
SelectedPresentations
Nesma autumn conference - Outsourcing needs software measurement - Werner Hei...
Nesma autumn conference - Outsourcing needs software measurement - Werner Hei...
Nesma
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
Stefan Streichsbier
Container Security: What Enterprises Need to Know
Container Security: What Enterprises Need to Know
DevOps.com
Securing Php App
Securing Php App
Aung Khant
JDO 2019: Insights from integratig Software Security Activities in Continuous...
JDO 2019: Insights from integratig Software Security Activities in Continuous...
PROIDEA
Recommended
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet
What does Glen Tupling do?
What does Glen Tupling do?
gtupling
Stu r35 a
Stu r35 a
SelectedPresentations
Nesma autumn conference - Outsourcing needs software measurement - Werner Hei...
Nesma autumn conference - Outsourcing needs software measurement - Werner Hei...
Nesma
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
Stefan Streichsbier
Container Security: What Enterprises Need to Know
Container Security: What Enterprises Need to Know
DevOps.com
Securing Php App
Securing Php App
Aung Khant
JDO 2019: Insights from integratig Software Security Activities in Continuous...
JDO 2019: Insights from integratig Software Security Activities in Continuous...
PROIDEA
Prove it, ship it! - XP2010 Lightning talk
Prove it, ship it! - XP2010 Lightning talk
Anders Sveen
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
WhiteSource
Mobile security new challenges practical solutions
Mobile security new challenges practical solutions
Interop
Security Architecture
Security Architecture
Phil Huggins FBCS CITP
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
Stefan Streichsbier
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
Stefan Streichsbier
The road goes ever on and on by Ciaran Conliffe
The road goes ever on and on by Ciaran Conliffe
DevSecCon
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
Stefan Streichsbier
The Unlikely Couple, DevOps and Security. Can it work?
The Unlikely Couple, DevOps and Security. Can it work?
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
Tribune Media Sec Architect
Tribune Media Sec Architect
Jacob Twisdale
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
Stefan Streichsbier
ALM and DevOps in the health industry
ALM and DevOps in the health industry
Agile Partner S.A.
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
WhiteSource
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe Again
James Neo
Operational security engineer architect
Operational security engineer architect
Mark Long
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
Adhitya Hartowo
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
Adhitya Hartowo
Agile Software Development
Agile Software Development
Devasis Roy
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Thierry Zoller
Collaborative Security: An approach to tackling Internet security issues
Collaborative Security: An approach to tackling Internet security issues
Internet Society
Implementation of a Secure Development Lifecycle (SDL) program ensures.pdf
Implementation of a Secure Development Lifecycle (SDL) program ensures.pdf
adhityalapcare
A journey into Application Security
A journey into Application Security
Christian Martorella
More Related Content
What's hot
Prove it, ship it! - XP2010 Lightning talk
Prove it, ship it! - XP2010 Lightning talk
Anders Sveen
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
WhiteSource
Mobile security new challenges practical solutions
Mobile security new challenges practical solutions
Interop
Security Architecture
Security Architecture
Phil Huggins FBCS CITP
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
Stefan Streichsbier
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
Stefan Streichsbier
The road goes ever on and on by Ciaran Conliffe
The road goes ever on and on by Ciaran Conliffe
DevSecCon
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
Stefan Streichsbier
The Unlikely Couple, DevOps and Security. Can it work?
The Unlikely Couple, DevOps and Security. Can it work?
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
Tribune Media Sec Architect
Tribune Media Sec Architect
Jacob Twisdale
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
Stefan Streichsbier
ALM and DevOps in the health industry
ALM and DevOps in the health industry
Agile Partner S.A.
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
WhiteSource
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe Again
James Neo
Operational security engineer architect
Operational security engineer architect
Mark Long
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
Adhitya Hartowo
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
Adhitya Hartowo
Agile Software Development
Agile Software Development
Devasis Roy
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Thierry Zoller
Collaborative Security: An approach to tackling Internet security issues
Collaborative Security: An approach to tackling Internet security issues
Internet Society
What's hot
(20)
Prove it, ship it! - XP2010 Lightning talk
Prove it, ship it! - XP2010 Lightning talk
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
Mobile security new challenges practical solutions
Mobile security new challenges practical solutions
Security Architecture
Security Architecture
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - DevSecOpsDays 2019
The road goes ever on and on by Ciaran Conliffe
The road goes ever on and on by Ciaran Conliffe
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
The Unlikely Couple, DevOps and Security. Can it work?
The Unlikely Couple, DevOps and Security. Can it work?
Tribune Media Sec Architect
Tribune Media Sec Architect
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
ALM and DevOps in the health industry
ALM and DevOps in the health industry
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
Team MESA - Make Elderly Safe Again
Team MESA - Make Elderly Safe Again
Operational security engineer architect
Operational security engineer architect
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
Agile Software Development
Agile Software Development
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Collaborative Security: An approach to tackling Internet security issues
Collaborative Security: An approach to tackling Internet security issues
Similar to It’s Time to Treat Software Engineers as Security Evangelists
Implementation of a Secure Development Lifecycle (SDL) program ensures.pdf
Implementation of a Secure Development Lifecycle (SDL) program ensures.pdf
adhityalapcare
A journey into Application Security
A journey into Application Security
Christian Martorella
Secure software development.pdf
Secure software development.pdf
IntuitiveCloud
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and Innovation
Netizen Corporation
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
A detailed guide about dev secops
A detailed guide about dev secops
Enov8
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
Asim Jahan
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
Enov8
Achieving Security and Compliance in DevOps Best Strategies.pdf
Achieving Security and Compliance in DevOps Best Strategies.pdf
Urolime Technologies
Security For Software Development - SynergyTop
Security For Software Development - SynergyTop
SynergyTop Inc.
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
DevSecOps for Agile Development: Integrating Security into the Agile Process
DevSecOps for Agile Development: Integrating Security into the Agile Process
Dev Software
Software risk management
Software risk management
Jose Javier M
The Teams Behind DevSecOps
The Teams Behind DevSecOps
Uleska
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
A detailed guide about dev secops.docx
A detailed guide about dev secops.docx
Enov8
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
CIO Look Magazine
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
Similar to It’s Time to Treat Software Engineers as Security Evangelists
(20)
Implementation of a Secure Development Lifecycle (SDL) program ensures.pdf
Implementation of a Secure Development Lifecycle (SDL) program ensures.pdf
A journey into Application Security
A journey into Application Security
Secure software development.pdf
Secure software development.pdf
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and Innovation
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
A detailed guide about dev secops
A detailed guide about dev secops
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
_Best practices towards a well-polished DevSecOps environment (1).pdf
_Best practices towards a well-polished DevSecOps environment (1).pdf
Achieving Security and Compliance in DevOps Best Strategies.pdf
Achieving Security and Compliance in DevOps Best Strategies.pdf
Security For Software Development - SynergyTop
Security For Software Development - SynergyTop
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
DevSecOps for Agile Development: Integrating Security into the Agile Process
DevSecOps for Agile Development: Integrating Security into the Agile Process
Software risk management
Software risk management
The Teams Behind DevSecOps
The Teams Behind DevSecOps
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
A detailed guide about dev secops.docx
A detailed guide about dev secops.docx
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Recently uploaded
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Recently uploaded
(20)
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
It’s Time to Treat Software Engineers as Security Evangelists
1.
It’s Time to
Treat Software Engineers as Security Evangelists Darren Hickling
2.
Welcome!
3.
Challenges, obstacles and opportunities
4.
Software engineering is incredibly diverse
5.
It is difficult
to prioritise security development, even with support!
6.
Keeping pace with technology is
a daily effort
7.
Aware of security flaws, not
necessarily how to prevent and mitigate
8.
Often stumble into security concerns
9.
Try and follow trends,
often without guidance
10.
Time to evaluate is
limited and precious
11.
Similar challenges exist for all companies of
any size
12.
What do software engineers
expect, then?
13.
Immediate access to your
product
14.
Consider a free model
for open- source projects
15.
Target students and universities
16.
Look to sponsor blogs,
events and projects
17.
Ensure it is
easy to install and configure on any platform
18.
Scale that same product
with demand
19.
Now watch us help
you sell it
20.
Accessibility is a price
worth paying
21.
Pro tip: we
are not all this guy
22.
Thanks for listening!
Download now