Ch 18 of Tetra Defense’s #20for2020: “Mind Your Own Business”
Way back in chapter 3, we talked about continuous vulnerability management, a critically important part of your information security program.
Today, we build on that by adding in the concept of #devsecops, or development security operations. The idea here is that in order to ensure the cybersecurity of applications you develop in-house, you need to apply the same level of rigor to them as you do to the applications and software you purchase from vendors (i.e. minding your own business!).
You can achieve this by encouraging your developers to employ secure coding practices, ensuring that developers have access to current resources & training around that topic, and by continuously monitoring the performance of, and updating, the software you develop.
Finally — Michael Young — this one’s for you. Go Crew.
Check out the rest of the 20 for 2020 video series:
https://blue.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-18-1.png6751200Marlene Joneshttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngMarlene Jones2020-04-14 10:26:002020-06-24 14:16:0520 for 2020: "The Obligatory Car Video"
https://blue.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-18.png6751200Marlene Joneshttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngMarlene Jones2020-04-06 12:00:002020-06-24 14:17:3020 for 2020: "Mind Your Own Business"
https://blue.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-17.png6751200Marlene Joneshttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngMarlene Jones2020-04-03 11:47:002020-06-24 14:18:4820 for 2020: "Awareness Training is Number 17..."
https://blue.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-14.png6751200Marlene Joneshttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngMarlene Jones2020-03-18 10:45:002020-06-24 14:20:0520 for 2020: "Wait, Didn't He Talk About This Already?"
https://blue.tetradefense.com/wp-content/uploads/2020/04/20-for-2020-13.png6751200Marlene Joneshttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngMarlene Jones2020-03-16 10:16:002020-06-24 14:20:2020 for 2020: "Live From New York, it's 20 for 2020!"
https://blue.tetradefense.com/wp-content/uploads/2020/04/11C.png6751200Marlene Joneshttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngMarlene Jones2020-03-03 16:23:002020-06-24 14:21:2720 for 2020: "The Never Ending Struggle"
https://blue.tetradefense.com/wp-content/uploads/2020/04/Chap-10.png6751200Marlene Joneshttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngMarlene Jones2020-02-17 17:17:002020-06-24 14:21:5920 for 2020: "Two is Better Than One"
https://blue.tetradefense.com/wp-content/uploads/2020/01/4.png6751200Lauren Reidhttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngLauren Reid2020-01-30 08:54:292020-06-24 14:23:5220 for 2020: "No one will draw the lines in the sand for you"
https://blue.tetradefense.com/wp-content/uploads/2020/01/2-1.png6751200Lauren Reidhttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngLauren Reid2020-01-20 15:37:282020-06-24 14:24:3520 for 2020: "Know What You Have" (Software Edition)
https://blue.tetradefense.com/wp-content/uploads/2020/01/1.png6751200Lauren Reidhttp://blue.tetradefense.com/wp-content/uploads/2020/11/New-Logo-x2-300x138.pngLauren Reid2020-01-16 15:45:072020-06-24 14:24:4920 for 2020: "Know What You Have" (Hardware Management Edition)
Ch 18 of Tetra Defense’s #20for2020: “Mind Your Own Business”
Way back in chapter 3, we talked about continuous vulnerability management, a critically important part of your information security program.
Today, we build on that by adding in the concept of #devsecops, or development security operations. The idea here is that in order to ensure the cybersecurity of applications you develop in-house, you need to apply the same level of rigor to them as you do to the applications and software you purchase from vendors (i.e. minding your own business!).
You can achieve this by encouraging your developers to employ secure coding practices, ensuring that developers have access to current resources & training around that topic, and by continuously monitoring the performance of, and updating, the software you develop.
Finally — Michael Young — this one’s for you. Go Crew.