We are excited to welcome Richard Seiersen to Wallarm advisory team. Richard brings tons of security experience from both start-ups and global companies and unique views on making the impact of security measurable.
We have asked Richard to share some of his thoughts on what’s important in cyber security.
From a product capabilities perspective, which includes API’s, here are things I consider:
DevOps is distinguished by continuous integration and continuous deployment. I do hear folks talk about SecDevOps but I am still unclear about their definition. Continuous is a rate term. It’s something that is always running or always on. Always on in security means “secure by default.” A huge part of approaching “continuous” is increasing the number of defaults. Defaults also include producing secure libraries for key security use cases and language sets. Short of “always on” we move to “PDQ” security, i.e. very short SLAs. For example, if there is a third party vulnerability with a patch, automated regression kicks in and the software is progressed to production upon passing, etc.
It certainly is a marketing buzzword. I prefer to think in terms of analytics. We have an analytics progression I observe in security. We have descriptive, heuristic, behavioral, predictive and prescriptive analytics. There may be more, but this will do. I don’t think most folks in security really know what any of these terms mean. For a security leader I spend a lot of time on these topics and I still get confused. But I have come to the conclusion that, as defenders, we absolutely compete with bad guys on analytics. AI, or robots, fall into the domain of prescriptive analytics if you hold to the above taxonomy. I think the lion’s share of the cost in robots is the cost of feeding them. That of course is a very information theory/decision analytics-centric perspective on things — i.e. the cost of increasingly perfect information etc. This is why having robots that can feed off your SDL, CI/CD and such is so key. There be treasure there (said in a pirate sounding voice). I think it’s the key to making well informed and lower cost robots. Nobody talks about this, I guess Wallarm does now.
Richard is a security executive, author and advisor with ~20 years experience ranging from start-ups to global organizations. Richard is currently holding a position of Chief Information Security Officer and VP of Trust at Twilio, where he is in charge of implementing the global security strategy for Twilio. Prior to Twilio he was the GM/VP of Cyber Security and Privacy for GE Healthcare.
Richard has extensive background in Information Security, Digital Risk Management and Product Development with an analytical bent.
He recently co-authored a decision analysis book called “How To Measure Anything In Cybersecurity Risk” (Wiley 2016) As of 2018, “The Green Book” is required reading for the Society of Actuaries exam prep and is finding its way into numerous university cybersecurity programs.
Your board wants AI. Your developers are building with it. Your budget committee is asking…
AI systems are no longer just isolated models responding to human prompts. In modern production…
Broken authorization is one of the most widely known API vulnerabilities. It features in the…
The shadow technology problem is getting worse. Over the past few years, organizations have scaled…
API security has been a growing concern for years. However, while it was always seen…
It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…