LocoMocoSec: Hawaii Product Security Conference
LocoMocoSec: Hawaii Product Security Conference
  • 40
  • 33 893
Security learns to sprint: DevSecOps - Tanya Janca
This talk will explain what security teams needs to adjust in order to turn DevOps into
DevSecOps within their organizations. Several strategies are presented for weaving
security into each of the "Three Ways", with clear steps audience members can start
implementing immediately.
This talk will argue that DevOps could be the best thing to happen to application security
since OWASP, if developers and operations teams are enabled to make security a part of
their everyday work. With a ratio of 100/10/1 for Development, Operations, and Security,
security now needs to concentrate on creating tools, processes and opportunities for dev
and ops that result in more-secure products, instead of trying to do it all themselves like they
did in days past. We must build security into each of “The Three Ways”; automating and/or
improving efficiency of all security activities to ensure we don’t slow down developers,
speeding up feedback loops for security related activities so that we fix the bugs faster and
sooner, and providing continuous learning opportunities in relation to security, for both
teams. Security can no longer be a gate or stumbling block, and ‘adding security in’ can no
longer be used as a justification for project delays. If developers are sprinting, then we need
to sprint too. So put on your running shoes; it’s time for DevSecOps!
Переглядів: 785

Відео

Bulletproof Shoes - Fikrie Yunaz, Nikki Brandt
Переглядів 3525 років тому
Version control software has come a long way, and the barrier to creating an open source project has been lowered to a point of being negligible. Experienced and inexperienced developers alike use hosted version control systems, such as GitHub, to share their code with the world. This open sharing of ideas is beneficial, but does come with occasional risks - accidentally publishing credentials ...
Upstreaming Security to Rails - Neil Matatall
Переглядів 1235 років тому
Web frameworks have helped enable development that just would not be practical otherwise. While frameworks can introduce unseen attack surfaces, they can also solve problems including entire classes of vulnerabilities, when a supported version of the framework is used properly. GitHub is in the interesting position of employing members of the rails security group, core maintainers, and public b...
SDL at scale: growing security champions - Ryan O'boyle
Переглядів 1775 років тому
If you’re tasked with securing a portfolio of applications it’s a practice in extremes. You’ve got a small team of security experts trying to help a multitude of developers, testers, and other engineers. You have to find a way to work with the team that’s been around forever doing Waterfall on one huge product, and at the same time you have to support all the microservices that the new Agile an...
A good first impression can work wonders: creating AppSec training that developers ❤ - Leif Dreizler
Переглядів 1135 років тому
Good vulnerability response practices are critical to software security. But good vulnerability response practices work even better on software built with security in mind. At Segment, we use vulnerability report data and gamification to help our developers grow their security mindset. In this session, we’ll explain our two-tiered approach to both helping developers understand trends in our vul...
JavaScript Supply Chain Security - Adam Baldwin
Переглядів 4985 років тому
In an npm survey of over 33,000 worldwide developers, 99% of JavaScript developers confirm they use open source code, 83% express concern about whether the open source software they use is secure, and 58% believe that there aren’t satisfactory methods for evaluating whether code is safe. npm is the worlds supplier of JavaScript, a very important piece of the dependency supply chain. In this tal...
Tips and tricks for effective vulnerability management - Pieter Okcers
Переглядів 1295 років тому
If you run a vulnerability response or bug bounty program (or both), there's a good chance you're experiencing substantial growth year over year. In this talk, Pieter Ockers of Adobe's PSIRT will tell the story of how incremental steps to mature a vulnerability management framework can help decrease the average number of unresolved vulnerabilities, as well as reducing the average age of unresol...
Multi-party vulnerability response in/with OSS - Jorge Lopez
Переглядів 815 років тому
The Microsoft Security Response Center leads vulnerability response and disclosure for all Microsoft’s products and services - including open source software that Microsoft maintains and products or services that consume OSS. OSS security vulnerabilities usually affect multiple parties and in many cases it is necessary for these parties to come together to coordinate the disclosure to minimize ...
Bug Bounty Botox - Katie Moussouris
Переглядів 2225 років тому
Bug bounties are beautiful, when done right. But what about bug bounties gone bad? Bug bounties have risen in popularity across the globe since the success of Hack the Pentagon, but we are rushing in to use it everywhere, even where sensitive assets are concerned. The allure of "thorough" security vulnerability testing at a fraction of the cost of traditional professional penetration testing se...
Evolving beyond the vulnerability whack-a-mole game - Jake Kouns
Переглядів 1115 років тому
With more than 197,000 known vulnerabilities published and over 22,000 new disclosures in 2018, organizations must make constant risk decisions. In fact, each day organizations have to ensure they are aware of approximately 60 new vulnerabilities, evaluate the potential impact to their organization’s products, and then determine if it warrants action. This task is daunting even to large, well s...
Visibility & Control: Addressing supply chain challenges - Bob Martin
Переглядів 665 років тому
Software is playing a pivotal role in most enterprises, whether they realize it or not, and with the advent of Industrial Internet of Things (IoT) and other cyber/physical systems across our society and critical infrastructure and our collective love affair with automation, optimization, and “smart” devices that role is only going to increase. This talk addresses the myriad of issues that under...
Have you adapted your AppSec? - David Lindner
Переглядів 1055 років тому
In the ever-evolving, fast-paced development world, application security has not scaled well. Incorporating application security and testing into the current development process is difficult, leading to incomplete tooling or unorthodox stoppages due to the required manual security assessments. Development teams are working with a backlog of stories, stories that are typically focused on feature...
The truth about cookies, tokens and APIs - Phillipe de Ryck
Переглядів 2,8 тис.5 років тому
With the rise of Single Page Applications, we also see a paradigm shift in session management techniques. Instead of using server-side cookie-based sessions, many developers are shifting towards client-side state mechanisms, using JWT tokens an custom HTTP headers. There’s plenty of conflicting advice out there, discussing cookie security issues, Cross-Site Request Forgery, and XSS. So how can ...
Hana Hou Panel
Переглядів 355 років тому
A recap of the conference discussing the prime topics with some of our speakers.
s (software bill of materials) - the looming format skirmish - David nalley
Переглядів 595 років тому
SBoMs - suddenly an item on every customer’s checklist. They all _KNOW_ they simply must have one to accompany their latest enterprise software purchase. But how many know what they are asking for? Is SBoM even a defined thing? It may be more likely that they think about SBoMs theoretically than practice. Many define SBoMs. SBoMs are supposed to provide us information efficiently. But how is th...
Who wants a thousand free puppies? - Michael Scovetta
Переглядів 2215 років тому
Who wants a thousand free puppies? - Michael Scovetta
Shifting Product Security from FORCEFUL to RESOURCEFUL - Christine Gadsby
Переглядів 1105 років тому
Shifting Product Security from FORCEFUL to RESOURCEFUL - Christine Gadsby
Trust & Safety Engineering @ GitHub - Lexi Galantino
Переглядів 7295 років тому
Trust & Safety Engineering @ GitHub - Lexi Galantino
Trusted types & the end of DOM XSS - Krzysztof Kotowicz
Переглядів 2,3 тис.5 років тому
Trusted types & the end of DOM XSS - Krzysztof Kotowicz
Content Security Policy: A successful mess between hardening and mitigation - Spagnuolo/Weichselbaum
Переглядів 2,5 тис.5 років тому
Content Security Policy: A successful mess between hardening and mitigation - Spagnuolo/Weichselbaum
The path to code provenance at uber - Matt Finifter, Debosmit Ray, Tony Ngo
Переглядів 3665 років тому
The path to code provenance at uber - Matt Finifter, Debosmit Ray, Tony Ngo
How not to use OAuth - Dr. Fett
Переглядів 3955 років тому
How not to use OAuth - Dr. Fett
The seven habits of a highly effective DevSecOp - James Wickett
Переглядів 1 тис.5 років тому
The seven habits of a highly effective DevSecOp - James Wickett
Recap and panel with Jeremiah Grossman, Troy Hunt, Gene Kim, Mike Arpaia
Переглядів 516 років тому
Recap and panel with Jeremiah Grossman, Troy Hunt, Gene Kim, Mike Arpaia
Allison Miller: Building Better Defenses: Engineering for the Human Factor
Переглядів 3786 років тому
Allison Miller: Building Better Defenses: Engineering for the Human Factor
John Melton: Starting an AppSec Program: An Honest Retrospective
Переглядів 4596 років тому
John Melton: Starting an AppSec Program: An Honest Retrospective
Alvaro Muñoz: .NET Serialization: Detecting and defending vulnerable endpoints
Переглядів 3,9 тис.6 років тому
Alvaro Muñoz: .NET Serialization: Detecting and defending vulnerable endpoints
Scott Helme: Revocation is broken, here's how we're fixing it
Переглядів 886 років тому
Scott Helme: Revocation is broken, here's how we're fixing it
Jeremy Long: The (Application) Patching Manifesto
Переглядів 1 тис.6 років тому
Jeremy Long: The (Application) Patching Manifesto
Alex Smolen: Identity and Access Management: Judgment Day
Переглядів 1576 років тому
Alex Smolen: Identity and Access Management: Judgment Day

КОМЕНТАРІ

  • @karenbenge-3164
    @karenbenge-3164 8 місяців тому

    Hello😊

  • @karenbenge-3164
    @karenbenge-3164 8 місяців тому

    My brand account url dns is not working

  • @jayshah5695
    @jayshah5695 2 роки тому

    Great explaination

  • @LindaLu-profile
    @LindaLu-profile 3 роки тому

    Way to go, Allison! Thanks for breaking down these concepts while adding in a Rick-Roll to boot!

  • @mrmobodies4879
    @mrmobodies4879 3 роки тому

    21:47 "Phising defences: does not require human judgement" Yes lets hid the information so the user can't see it.

  • @mrmobodies4879
    @mrmobodies4879 3 роки тому

    Hiding the HTTPS:// part Sounds like bullsh*t to me. It was "Emily Schechter" and now it is "Emily Stark" at it who wants to dumbed it down feven urther with just showing the search term. I have seen fake payment portals still get around the certificates and was maked safe.

  • @jorgeriveramx
    @jorgeriveramx 3 роки тому

    Outstanding presentation, thanks a lot.

  • @domaincontroller
    @domaincontroller 3 роки тому

    02:07 the URLelephant in the room 03:38 scheme is supposed to represent connection security 05:08 scheme

  • @hasparus
    @hasparus 3 роки тому

    22:50 I don't how hard can it be to send an API's authorization header only to the API that the token belongs to. Couldn't we ignore Angular if it makes stuff so hard? Calling the endpoint with proper headers using Vanilla.js Fetch API is pretty straightforward.

  • @jjohn8457
    @jjohn8457 3 роки тому

    I saw the OWAZP demonstration on youtube and it is very informative. I am new to security testing as my experience is in software development. I have a question regarding OWAZP dependency check. Should we execute the OWASP dependency check on published dlls/binaries or on actual project files Consider the following two scenarios? I have a .Net core project. The actual source code containers .csproject and .cs files. But if we publish, we will get a folder with dlls only which is going to be deployed in the IIS virtual directory. The virtual directory is the one that is going to be exposed to the external world. I have an angular project and in that, a lot of npm modules are installed. But if we publish, we will get a small subset of javascript files which is going to be deployed in a web server. In both cases, if we run the dependency check, we will get a lot of warning/issues in reports. So my question, where exactly should we execute our scan? In the original repository or the output binaries? What will be rational for the decision? It will be great if I could get some pointers in this as I couldn't find any answer in stack overflow or similar blogs. Thanks in advance.

  • @Dooglet
    @Dooglet 3 роки тому

    we really probably should talk about the DNS Empire at some point, would love to hear Emily's thoughts

  • @parthapal8380
    @parthapal8380 4 роки тому

    In this presentation Philippe clears a confusing concept of reference token and self contained token flows

  • @jessecrawford1926
    @jessecrawford1926 5 років тому

    Keep it up, great video! Did you ever see zmsocial`dot’com!? You should use it to help get your videos higher in the search results!

  • @flyerfocus6259
    @flyerfocus6259 5 років тому

    Can't hear you!

  • @leisureclub_
    @leisureclub_ 5 років тому

    Dear Sir, Any slides related to this presentation?

  • @YashendraShuklaTheOG
    @YashendraShuklaTheOG 6 років тому

    This was hella interesting. Thanks a lot to Troy for linking this!

  • @taleliyahu3236
    @taleliyahu3236 6 років тому

    "Application developers should use a lockfile (package-lock.json or yarn.lock) to prevent the auto-install of new packages." - one of the recommendations from ESlint breach. Even if it's a pull request it will be too hard to find the 1 line of code that caused it before committing to master.

  • @dielfonelletab8711
    @dielfonelletab8711 6 років тому

    Great presentation. Troy is a great speaker.

  • @LadyB_miniatures
    @LadyB_miniatures 6 років тому

    Amber Rudd and Malcom Turnbull in Australia haven’t got a fucking clue how encryption works or how tech works at all... I’m waiting for the day the try to force Apple (like the FBI tried ) and told the to fuck off

  • @kevinhock1041
    @kevinhock1041 6 років тому

    Great talk Dev!