Securing the Software

By Mrudul Uchil , Abhisek Datta , Harish Goel , Matthew Bohne on 06 Sep 2022 @ Nullcon
πŸ“Ή Video
#software-security #secure-development #security-testing #code-review #static-analysis #secure-coding
Focus Areas: πŸ” Application Security , βš™οΈ DevSecOps , 🦠 Malware Analysis

Presentation Material

AI Generated Summary

Here is a summary of the conversation:

The discussion revolves around application security, . The speaker emphasizes that as a defender, security team’s job is extremely difficult because they need to be good at everything and know about all attack surfaces, whereas attackers only need to find one vulnerability.

The speaker highlights the importance of threat modeling and security architecture review in identifying threats early on in the system development life cycle (SDLC). This can help reduce the attack surface, which is a critical aspect of defense.

A question is raised by Anil from Carrier Corporation about dealing with open-source components that have not been updated for several years. The speaker responds that this is a common challenge and suggests that either replacing the component with an internally developed one or finding a more mature alternative may be necessary. This underscores the complexity of supply chain security, which goes beyond just vulnerability checks.

The conversation concludes with the speaker reiterating the importance of having controls in place to detect and deny the use of unapproved third-party components, ensuring that only mature and well-maintained libraries are used in system development.

Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview β€” always refer to the original talk for authoritative content. Learn more about our AI experiments.