OWASP
Update
[@/+]toddgrotenhuis
AppSecUSA:
The best infosec
conference
[@/+]toddgrotenhuis
Keynotes
-Alex Stamos - Facebook
-Phyllis Schneck - DHS
-Troy Hunt - HIBP
[@/+]toddgrotenhuis
Opening Keynote
→ Understand your userbase
→ Focus on real vs potential harm
→ Stop whining and do good at the margins
[@/+]toddgrotenhuis
Accept non-optimal
solutions in non-optimal
situations
— Alex Stamos
[@/+]toddgrotenhuis
Security As Code: A New Frontier
→ RuggedSoftware.org
→ DevSecOps.org
[@/+]toddgrotenhuis
Rugged Manifesto
I am rugged and, more importantly, my code is rugged.
I recognize that software has become a foundation of our modern world.
I recognize the awesome responsibility that comes with this foundational role.
I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended.
I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic and national security.
I recognize these things – and I choose to be rugged.
I am rugged because I refuse to be a source of vulnerability or weakness.
I am rugged because I assure my code will support its mission.
I am rugged because my code can face these challenges and persist in spite of them.
I am rugged, not because it is easy, but because it is necessary and I am up for the challenge.
[@/+]toddgrotenhuis
DevSecOps
→ Leaning in over Always Saying “No”
→ Data & Security Science over Fear, Uncertainty
and Doubt
→ Open Contribution & Collaboration over Security-
Only Requirements
→ Consumable Security Services with APIs over
Mandated Security Controls & Paperwork
[@/+]toddgrotenhuis
Security as Code
→ what all can you define in software?
→ what can you automate?
→ even "traditional" stuff?
→ even "non-boring" stuff?
[@/+]toddgrotenhuis
Rant Time
Do you like to talk about how old attacks continue
to work on customers?
This says at least as much about your effectiveness
as a consultant as it does about your clients'
effectiveness as an organization
(note: you are the common denominator)
[@/+]toddgrotenhuis
Strengthening the Weakest Link:
How to manage security vulnerabilities in 3rd party libraries used by your application
→ OWASP Dependency Check
→ Sonatype Nexus
→ Palamida
→ Black Duck Hub
→ Others
[@/+]toddgrotenhuis
→ Use fewer and better suppliers
→ Use only the highest quality parts
→ Track what is used and where
→ Use repository managers over direct downloads
[@/+]toddgrotenhuis
Practical Application Security
Management:
How to Win an Economically One-Side War
→ costs are not just money, but time, people,
complexity
→ the business will always come first
[@/+]toddgrotenhuis
→ actual sign-off from product owners on issues
reduces those that go through
→ satisfy people’s creative urges to make
→ security days: employees shadow for a day
→ reward reporting/submissions
[@/+]toddgrotenhuis
Delayed launch is a denial
of service
— Dheeraj Bhat
[@/+]toddgrotenhuis
The End of Security as We Know It:
why this might be a good thing
→ sometimes security is the only group with an
overall view
→ avoid “perfection complex”
→ MTTRemediate -> MTTRestore
→ “fuzz” non-technical things (e.g. processes)
[@/+]toddgrotenhuis
→ Data Driven Decisions
→ Smaller Changes
→ Faster Failure
→ If It Hurts, Do It More
[@/+]toddgrotenhuis
Tool Requirements
→ sufficient logging
→ appropriate encryption
→ APIs / software definable / scriptable
→ test & abuse before purchase
→ take the bluecoat pledge
[@/+]toddgrotenhuis
Keynote 2
redacted
[@/+]toddgrotenhuis
Future Banks Live in the Cloud:
building a usable cloud with uncompromising security
→ security around money used to be physical
→ “extract value” as a better way of thinking about
attackers
→ empower engineers and help them choose
[@/+]toddgrotenhuis
Consensus-Based Deployment
1. anyone can propose a change
2. a non-involved party must approve the change
3. anyone can apply the change
[@/+]toddgrotenhuis
No one person should be
able to “accidentally the
company”
— Rob Witoff
[@/+]toddgrotenhuis
Don’t partner with
vendors without a clear
whitehat program.
— Rob Witoff
[@/+]toddgrotenhuis
Doing AppSec at Scale:
taking the best of DevOps, Agile, and CI/CD into AppSec
→ AppSec Pipeline
→ Gauntlt
→ Threadfix
→ Bag of Holding
[@/+]toddgrotenhuis
In application security,
personnel are the critical
resource, so design for
optimizing them
— Aaron Weaver
[@/+]toddgrotenhuis
If I can do it with a UI, I
want to do it with an API
— Matt Tesauro
[@/+]toddgrotenhuis
Closing Keynote
“50 Shades of AppSec” with Troy Hunt
[@/+]toddgrotenhuis
OWASP.org
2015.appsecusa.org
Talks YouTube Playlist
OWASP Board Elections
Safecode Free Courses
[@/+]toddgrotenhuis

More Related Content

PDF
Defense in Depth: Lessons Learned Securing 200,000 Sites
PDF
Practical security in a DevOps World
PPTX
Improving privacy in blockchain using homomorphic encryption
PDF
Let's Encrypt! Wait. Why? How? - WC Pune
PDF
Let's Encrypt! Wait. Why? How?
PDF
Real world blockchains
PDF
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
PDF
Insecurity-In-Security version.2 (2011)
Defense in Depth: Lessons Learned Securing 200,000 Sites
Practical security in a DevOps World
Improving privacy in blockchain using homomorphic encryption
Let's Encrypt! Wait. Why? How? - WC Pune
Let's Encrypt! Wait. Why? How?
Real world blockchains
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Insecurity-In-Security version.2 (2011)

What's hot (17)

PPTX
Top 10 Web Hacks 2013
PDF
Upgrading the Web with Douglas Crockford @ FITC's Web Unleashed 2015
PPTX
Top 10 Encryption Myths
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Insecurity-In-Security version.1 (2010)
DOCX
a hybrid cloud approach for secure authorized reduplications
PPTX
Practical Cryptography and Security Concepts for Developers
PDF
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
PDF
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
PPTX
Testing in the blockchain
PDF
[JSDC 2021] Blockchain 101 for Frontend Engs
PDF
Security is a process, not a plugin (WordCamp Torino 2018)
PDF
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
PPTX
Cassandra
PDF
Introduction to Security Vulnerabilities
PDF
Things will Change - Usenix Keynote UCMS'14
PDF
Global bigdata conf_01282013
Top 10 Web Hacks 2013
Upgrading the Web with Douglas Crockford @ FITC's Web Unleashed 2015
Top 10 Encryption Myths
A hybrid cloud approach for secure authorized deduplication
Insecurity-In-Security version.1 (2010)
a hybrid cloud approach for secure authorized reduplications
Practical Cryptography and Security Concepts for Developers
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
Testing in the blockchain
[JSDC 2021] Blockchain 101 for Frontend Engs
Security is a process, not a plugin (WordCamp Torino 2018)
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
Cassandra
Introduction to Security Vulnerabilities
Things will Change - Usenix Keynote UCMS'14
Global bigdata conf_01282013
Ad

Viewers also liked (20)

PPTX
PDF
What is Fundraising Success? by Matt Kupec
DOCX
Ensayo bases de datos DAMARIS
PPTX
Ppt 21 9-15
PPT
Sistemas operativos
PPTX
intellectual property rights
PPTX
Institution analysis final
DOCX
Evitar las enfermedades
PPT
Les prépositions
DOC
Orido Vincent Akpomefure
PDF
Fall 2015 MN AAHAM Newsletter
PPTX
Plastic labware models set
PPTX
การกำเนิดเทคโนโลยีสารสนเทศ
PDF
AGNES'S PORTFOLIO
PDF
Legal issues in_the_music_industry
PPTX
Grass-4_rus
PDF
6 a brandiepratt
PDF
Winter drawing how_tos
DOC
Fred Swenson Research Paper
What is Fundraising Success? by Matt Kupec
Ensayo bases de datos DAMARIS
Ppt 21 9-15
Sistemas operativos
intellectual property rights
Institution analysis final
Evitar las enfermedades
Les prépositions
Orido Vincent Akpomefure
Fall 2015 MN AAHAM Newsletter
Plastic labware models set
การกำเนิดเทคโนโลยีสารสนเทศ
AGNES'S PORTFOLIO
Legal issues in_the_music_industry
Grass-4_rus
6 a brandiepratt
Winter drawing how_tos
Fred Swenson Research Paper
Ad

Similar to OWASP AppSecUSA Recap (20)

DOCX
Webinar Security: Apps of Steel transcription
PDF
How the Switch to a Predominantly Remote Workforce Accelerated IT and Securit...
PDF
Broken by design (Danny Fullerton)
PDF
How A-Core Concrete Sets a Solid Foundation for Preemptive Security
PDF
So... you want to be a security consultant
PDF
AEPWP09292016
PDF
Why isn't infosec working? Did you turn it off and back on again?
PDF
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
PPT
#CU12: Another cloud is possible - Allen Gunn at Connecting Up 2012
PDF
LogDNA and CloudFoundry Webinar: Open Ecosystems, Interoperability + Multi-Cl...
PDF
Asset Discovery in India – Redhunt Labs
PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
Security in the Cloud: Tips on How to Protect Your Data
PPTX
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
PPTX
Keynote at the Cyber Security Summit Prague 2015
ODP
Staying Safe - Overview of FREE Encryption Tools
PPTX
Security for AWS : Journey to Least Privilege (update)
PDF
Security for AWS: Journey to Least Privilege
PPTX
Teensy Programming for Everyone
PPTX
Security engineering 101 when good design & security work together
Webinar Security: Apps of Steel transcription
How the Switch to a Predominantly Remote Workforce Accelerated IT and Securit...
Broken by design (Danny Fullerton)
How A-Core Concrete Sets a Solid Foundation for Preemptive Security
So... you want to be a security consultant
AEPWP09292016
Why isn't infosec working? Did you turn it off and back on again?
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
#CU12: Another cloud is possible - Allen Gunn at Connecting Up 2012
LogDNA and CloudFoundry Webinar: Open Ecosystems, Interoperability + Multi-Cl...
Asset Discovery in India – Redhunt Labs
Tech Talent Meetup Hacking Security Event Recap
Security in the Cloud: Tips on How to Protect Your Data
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Keynote at the Cyber Security Summit Prague 2015
Staying Safe - Overview of FREE Encryption Tools
Security for AWS : Journey to Least Privilege (update)
Security for AWS: Journey to Least Privilege
Teensy Programming for Everyone
Security engineering 101 when good design & security work together

Recently uploaded (20)

PPTX
Configure Apache Mutual Authentication
PPT
What is a Computer? Input Devices /output devices
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Modernising the Digital Integration Hub
PPTX
The various Industrial Revolutions .pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
STKI Israel Market Study 2025 version august
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPT
Geologic Time for studying geology for geologist
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Architecture types and enterprise applications.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Microsoft Excel 365/2024 Beginner's training
Configure Apache Mutual Authentication
What is a Computer? Input Devices /output devices
Getting started with AI Agents and Multi-Agent Systems
Abstractive summarization using multilingual text-to-text transfer transforme...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Modernising the Digital Integration Hub
The various Industrial Revolutions .pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Enhancing emotion recognition model for a student engagement use case through...
Module 1.ppt Iot fundamentals and Architecture
sustainability-14-14877-v2.pddhzftheheeeee
STKI Israel Market Study 2025 version august
Custom Battery Pack Design Considerations for Performance and Safety
Geologic Time for studying geology for geologist
sbt 2.0: go big (Scala Days 2025 edition)
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Architecture types and enterprise applications.pdf
UiPath Agentic Automation session 1: RPA to Agents
2018-HIPAA-Renewal-Training for executives
Microsoft Excel 365/2024 Beginner's training

OWASP AppSecUSA Recap

  • 3. Keynotes -Alex Stamos - Facebook -Phyllis Schneck - DHS -Troy Hunt - HIBP [@/+]toddgrotenhuis
  • 4. Opening Keynote → Understand your userbase → Focus on real vs potential harm → Stop whining and do good at the margins [@/+]toddgrotenhuis
  • 5. Accept non-optimal solutions in non-optimal situations — Alex Stamos [@/+]toddgrotenhuis
  • 6. Security As Code: A New Frontier → RuggedSoftware.org → DevSecOps.org [@/+]toddgrotenhuis
  • 7. Rugged Manifesto I am rugged and, more importantly, my code is rugged. I recognize that software has become a foundation of our modern world. I recognize the awesome responsibility that comes with this foundational role. I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended. I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic and national security. I recognize these things – and I choose to be rugged. I am rugged because I refuse to be a source of vulnerability or weakness. I am rugged because I assure my code will support its mission. I am rugged because my code can face these challenges and persist in spite of them. I am rugged, not because it is easy, but because it is necessary and I am up for the challenge. [@/+]toddgrotenhuis
  • 8. DevSecOps → Leaning in over Always Saying “No” → Data & Security Science over Fear, Uncertainty and Doubt → Open Contribution & Collaboration over Security- Only Requirements → Consumable Security Services with APIs over Mandated Security Controls & Paperwork [@/+]toddgrotenhuis
  • 9. Security as Code → what all can you define in software? → what can you automate? → even "traditional" stuff? → even "non-boring" stuff? [@/+]toddgrotenhuis
  • 10. Rant Time Do you like to talk about how old attacks continue to work on customers? This says at least as much about your effectiveness as a consultant as it does about your clients' effectiveness as an organization (note: you are the common denominator) [@/+]toddgrotenhuis
  • 11. Strengthening the Weakest Link: How to manage security vulnerabilities in 3rd party libraries used by your application → OWASP Dependency Check → Sonatype Nexus → Palamida → Black Duck Hub → Others [@/+]toddgrotenhuis
  • 12. → Use fewer and better suppliers → Use only the highest quality parts → Track what is used and where → Use repository managers over direct downloads [@/+]toddgrotenhuis
  • 13. Practical Application Security Management: How to Win an Economically One-Side War → costs are not just money, but time, people, complexity → the business will always come first [@/+]toddgrotenhuis
  • 14. → actual sign-off from product owners on issues reduces those that go through → satisfy people’s creative urges to make → security days: employees shadow for a day → reward reporting/submissions [@/+]toddgrotenhuis
  • 15. Delayed launch is a denial of service — Dheeraj Bhat [@/+]toddgrotenhuis
  • 16. The End of Security as We Know It: why this might be a good thing → sometimes security is the only group with an overall view → avoid “perfection complex” → MTTRemediate -> MTTRestore → “fuzz” non-technical things (e.g. processes) [@/+]toddgrotenhuis
  • 17. → Data Driven Decisions → Smaller Changes → Faster Failure → If It Hurts, Do It More [@/+]toddgrotenhuis
  • 18. Tool Requirements → sufficient logging → appropriate encryption → APIs / software definable / scriptable → test & abuse before purchase → take the bluecoat pledge [@/+]toddgrotenhuis
  • 20. Future Banks Live in the Cloud: building a usable cloud with uncompromising security → security around money used to be physical → “extract value” as a better way of thinking about attackers → empower engineers and help them choose [@/+]toddgrotenhuis
  • 21. Consensus-Based Deployment 1. anyone can propose a change 2. a non-involved party must approve the change 3. anyone can apply the change [@/+]toddgrotenhuis
  • 22. No one person should be able to “accidentally the company” — Rob Witoff [@/+]toddgrotenhuis
  • 23. Don’t partner with vendors without a clear whitehat program. — Rob Witoff [@/+]toddgrotenhuis
  • 24. Doing AppSec at Scale: taking the best of DevOps, Agile, and CI/CD into AppSec → AppSec Pipeline → Gauntlt → Threadfix → Bag of Holding [@/+]toddgrotenhuis
  • 25. In application security, personnel are the critical resource, so design for optimizing them — Aaron Weaver [@/+]toddgrotenhuis
  • 26. If I can do it with a UI, I want to do it with an API — Matt Tesauro [@/+]toddgrotenhuis
  • 27. Closing Keynote “50 Shades of AppSec” with Troy Hunt [@/+]toddgrotenhuis
  • 28. OWASP.org 2015.appsecusa.org Talks YouTube Playlist OWASP Board Elections Safecode Free Courses [@/+]toddgrotenhuis