SlideShare a Scribd company logo
THE
SECURITY
INFLUENCER’S
CHANNEL
HOSTED BY JEFF WILLIAMS
CHIEF TECHNOLOGY OFFICER, CONTRAST SECURITY
Episode One:
Jonathan Chow and Neeta Maniar
Live Nation Entertainment
JEFF WILLIAMS
“What’s the one thing that deeply bothers you
about the way people practice application
security today?
NEETA MANIAR
“…for me, it’s that we’re finding vulnerabilities
that existed 10 years ago…we’re still not
getting good at fixing [them].”
JONATHAN CHOW
“I’ve been involved in part of an applications
program here for 12 years now, and we’re still
having developers creating the same flaws…so
I think the education piece is what’s missing.
We’ve got to stop making the same mistakes.”
JEFF WILLIAMS
“I couldn’t agree more…I wrote the first
version of the OWASP Top Ten in 2002, and it’s
essentially the same stuff in there still after 12
years. It’s really not changing, so that’s a bit of a
failure for the security industry.”
JEFF
“How do you stay on top of your portfolio of
applications, the developers writing new code,
and new vulnerabilities coming out?”
JONATHAN
“It’s almost a job unto itself….I try and
maintain good relationships with our business
partners…because in some cases they’ll go
outside approved IT folks to get it done
cheaper, faster, better. And that’s a primary
driver for rogue work happening.”
NEETA
“We’ve just hired what we call ‘Business
Security Leaders’ so they’re our liaison….we’re
just trying to make [security] more visible in
those areas….we’re trying to empower the
teams to do that better themselves.”
JEFF
“Interesting. I like that. I’ve been studying the
ways that industrial factories monitor their
complex systems….What I’m wondering…It
sounds like what you’re doing is like a human
instrumentation where you’re gathering data
through relationships with various teams.”
NEETA
“I think it’s really important…scanning
technology…and it’s important for that to be
well integrated into the tools we already use.
Any SDLC process, whether you’re doing QA or
builds, trying to inject security into those
particular tools is going to be important for
any instrumentation.”
JONATHAN
JEFF
JEFF WILLIAMS
“How do you feel about your visibility into the
apps and other systems that you run?...What do
you do to fill in the gaps and make it look up-to-
date?”
JONATHAN
“What Neeta said earlier was not enough
bandwidth. It’s true for every IT security shop
that I’ve ever talked to or been a part
of….You’re always going to be overwhelmed.
You’re always going to be outnumbered.”
JEFF
“That strikes me as exactly what needs to
happen…the security experts really need to get
out of the way and enable the development
teams to do these things for themselves with
automation and guidance and training.”
NEETA
“I remember working at GE and having that-
you’d have such a long time between when an
application requirement came out and when it
was released…at an agile environment, if
you’re not there then you miss it and it’s kind of
harder now to have that position.”
JONATHAN
“It’s actually the worst of all worlds if you miss
it because…you either slow them down and
they won’t come back, or you interrupt their
process and they see you as incompetent….We
risk becoming the proverbial dinosaur where
we don’t have a place in the new world.”
JEFF
“Do you feel that’s the only pressure on security
groups? The move to Agile and DevOps kinds of
organizations? Or are there other things that
are changing the way people do security or
security information?”
NEETA
“I think there’s also a positive change. I think
that application security is a pretty hot topic
now, more than it was years ago, it’s more
visible. We joke that we use security breaches
as our leverage to convince teams to do
more.”
JEFF
“I know we’ve broken out of the echo chamber
when my mom calls and says, “What’s going on
with this HeartBleed thing?”
JEFF
“I want to know: what are the key metrics that
you want to know so you can sleep at night?”
JONATHAN
“A raw number of flaws in applications is a key
metric for me.”
JONATHAN
“I would love to get down to the point where I
can go to a specific developer and say, “You
know, you’ve been making cross-site scripting
errors since 2006. You’ve made it January here,
you made it in March here, you made it in
October here, I need to teach you something.”
JONATHAN
“If we can get to that point where the
developers and development teams and
outsourced development shops can accept the
fact that security teams are here to make them
better at their jobs…then I think it will gain
more momentum.”
NEETA
“I think that any metrics that help us
understand the progress, trending metrics,
from point A to point B…I think that’s been
really helpful for us to say to a team,
‘Congratulations!’”
NEETA
“On the educational side, vulnerabilities by
technology so we can figure out, ‘What should
we be training our teams on?’”
JEFF WILLIAMS
WITH
JONATHAN CHOW
AND
NEETA MANIAR

More Related Content

Similar to Security Influencer's Channel Episode One: Live Nation Entertainment

Episode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNSEpisode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNS
Contrast Security
 
A Tech Talks About DevOps Solution With Yann Mulonda
A Tech Talks About DevOps Solution With Yann MulondaA Tech Talks About DevOps Solution With Yann Mulonda
A Tech Talks About DevOps Solution With Yann Mulonda
Cerebrum Infotech
 
DevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in HeavenDevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in Heaven
Dana Gardner
 
A Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdfA Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdf
TravisMcPeak1
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.com
Contrast Security
 
Desktop Virtualization Deployment Insights - 6 IT experts share their advice
Desktop Virtualization Deployment Insights - 6 IT experts share their adviceDesktop Virtualization Deployment Insights - 6 IT experts share their advice
Desktop Virtualization Deployment Insights - 6 IT experts share their advice
Citrix
 
Desktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookDesktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBook
Citrix
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed Apidays
Ori Pekelman
 
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
Dana Gardner
 
When Things Go Bump in the Night
When Things Go Bump in the NightWhen Things Go Bump in the Night
When Things Go Bump in the Night
ahamilton55
 
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya JancaDevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
DevSecCon
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applications
Magno Logan
 
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
adamdeja
 
Why happier developers create more secure code
Why happier developers create more secure codeWhy happier developers create more secure code
Why happier developers create more secure code
DJ Schleen
 
IT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdfIT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdf
VisalThach1
 
IT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdfIT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdf
VisalThach1
 
Software Engineering Paper
Software Engineering PaperSoftware Engineering Paper
Software Engineering Paper
Lana Sorrels
 
Software Engineering CS-504 Handouts
Software Engineering   CS-504 HandoutsSoftware Engineering   CS-504 Handouts
Software Engineering CS-504 Handouts
Sohaib Danish
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Dana Gardner
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️
Ori Pekelman
 

Similar to Security Influencer's Channel Episode One: Live Nation Entertainment (20)

Episode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNSEpisode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNS
 
A Tech Talks About DevOps Solution With Yann Mulonda
A Tech Talks About DevOps Solution With Yann MulondaA Tech Talks About DevOps Solution With Yann Mulonda
A Tech Talks About DevOps Solution With Yann Mulonda
 
DevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in HeavenDevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in Heaven
 
A Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdfA Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdf
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.com
 
Desktop Virtualization Deployment Insights - 6 IT experts share their advice
Desktop Virtualization Deployment Insights - 6 IT experts share their adviceDesktop Virtualization Deployment Insights - 6 IT experts share their advice
Desktop Virtualization Deployment Insights - 6 IT experts share their advice
 
Desktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookDesktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBook
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed Apidays
 
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
 
When Things Go Bump in the Night
When Things Go Bump in the NightWhen Things Go Bump in the Night
When Things Go Bump in the Night
 
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya JancaDevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
 
Just4Meeting 2012 - How to protect your web applications
Just4Meeting 2012 -  How to protect your web applicationsJust4Meeting 2012 -  How to protect your web applications
Just4Meeting 2012 - How to protect your web applications
 
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
 
Why happier developers create more secure code
Why happier developers create more secure codeWhy happier developers create more secure code
Why happier developers create more secure code
 
IT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdfIT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdf
 
IT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdfIT SPOTLIGHT - Ken M.pdf
IT SPOTLIGHT - Ken M.pdf
 
Software Engineering Paper
Software Engineering PaperSoftware Engineering Paper
Software Engineering Paper
 
Software Engineering CS-504 Handouts
Software Engineering   CS-504 HandoutsSoftware Engineering   CS-504 Handouts
Software Engineering CS-504 Handouts
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️
 

Recently uploaded

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Security Influencer's Channel Episode One: Live Nation Entertainment

  • 1. THE SECURITY INFLUENCER’S CHANNEL HOSTED BY JEFF WILLIAMS CHIEF TECHNOLOGY OFFICER, CONTRAST SECURITY Episode One: Jonathan Chow and Neeta Maniar Live Nation Entertainment
  • 2. JEFF WILLIAMS “What’s the one thing that deeply bothers you about the way people practice application security today?
  • 3. NEETA MANIAR “…for me, it’s that we’re finding vulnerabilities that existed 10 years ago…we’re still not getting good at fixing [them].”
  • 4. JONATHAN CHOW “I’ve been involved in part of an applications program here for 12 years now, and we’re still having developers creating the same flaws…so I think the education piece is what’s missing. We’ve got to stop making the same mistakes.”
  • 5. JEFF WILLIAMS “I couldn’t agree more…I wrote the first version of the OWASP Top Ten in 2002, and it’s essentially the same stuff in there still after 12 years. It’s really not changing, so that’s a bit of a failure for the security industry.”
  • 6. JEFF “How do you stay on top of your portfolio of applications, the developers writing new code, and new vulnerabilities coming out?”
  • 7. JONATHAN “It’s almost a job unto itself….I try and maintain good relationships with our business partners…because in some cases they’ll go outside approved IT folks to get it done cheaper, faster, better. And that’s a primary driver for rogue work happening.”
  • 8. NEETA “We’ve just hired what we call ‘Business Security Leaders’ so they’re our liaison….we’re just trying to make [security] more visible in those areas….we’re trying to empower the teams to do that better themselves.”
  • 9. JEFF “Interesting. I like that. I’ve been studying the ways that industrial factories monitor their complex systems….What I’m wondering…It sounds like what you’re doing is like a human instrumentation where you’re gathering data through relationships with various teams.”
  • 10. NEETA “I think it’s really important…scanning technology…and it’s important for that to be well integrated into the tools we already use. Any SDLC process, whether you’re doing QA or builds, trying to inject security into those particular tools is going to be important for any instrumentation.”
  • 12. JEFF
  • 13. JEFF WILLIAMS “How do you feel about your visibility into the apps and other systems that you run?...What do you do to fill in the gaps and make it look up-to- date?”
  • 14. JONATHAN “What Neeta said earlier was not enough bandwidth. It’s true for every IT security shop that I’ve ever talked to or been a part of….You’re always going to be overwhelmed. You’re always going to be outnumbered.”
  • 15. JEFF “That strikes me as exactly what needs to happen…the security experts really need to get out of the way and enable the development teams to do these things for themselves with automation and guidance and training.”
  • 16. NEETA “I remember working at GE and having that- you’d have such a long time between when an application requirement came out and when it was released…at an agile environment, if you’re not there then you miss it and it’s kind of harder now to have that position.”
  • 17. JONATHAN “It’s actually the worst of all worlds if you miss it because…you either slow them down and they won’t come back, or you interrupt their process and they see you as incompetent….We risk becoming the proverbial dinosaur where we don’t have a place in the new world.”
  • 18. JEFF “Do you feel that’s the only pressure on security groups? The move to Agile and DevOps kinds of organizations? Or are there other things that are changing the way people do security or security information?”
  • 19. NEETA “I think there’s also a positive change. I think that application security is a pretty hot topic now, more than it was years ago, it’s more visible. We joke that we use security breaches as our leverage to convince teams to do more.”
  • 20. JEFF “I know we’ve broken out of the echo chamber when my mom calls and says, “What’s going on with this HeartBleed thing?”
  • 21. JEFF “I want to know: what are the key metrics that you want to know so you can sleep at night?”
  • 22. JONATHAN “A raw number of flaws in applications is a key metric for me.”
  • 23. JONATHAN “I would love to get down to the point where I can go to a specific developer and say, “You know, you’ve been making cross-site scripting errors since 2006. You’ve made it January here, you made it in March here, you made it in October here, I need to teach you something.”
  • 24. JONATHAN “If we can get to that point where the developers and development teams and outsourced development shops can accept the fact that security teams are here to make them better at their jobs…then I think it will gain more momentum.”
  • 25. NEETA “I think that any metrics that help us understand the progress, trending metrics, from point A to point B…I think that’s been really helpful for us to say to a team, ‘Congratulations!’”
  • 26. NEETA “On the educational side, vulnerabilities by technology so we can figure out, ‘What should we be training our teams on?’”