0:00
/
0:00
Transcript

Resilient Cyber w/ Jeff & Naomi - The AI-Driven Shift to Runtime AppSec

In this episode of Resilient Cyber, I sit down with longtime industry AppSec leader and Founder/CTO of Contrast Security, Jeff Williams, along with Contrast Security’s Sr. Director of Product Security Naomi Buckwalter, to discuss all things Application Detection & Response (ADR), as well as the implications of AI-driven development.


Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 40,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.


Prefer to listen?

Spotify

Apple Podcasts

Please be sure to leaving a rating and review, it helps a ton.


Jeff and Naomi and I dove into a lot of excellent topics, including:

  • Jeff’s role as a longtime AppSec industry leader and the recent rise of the categorization “Application Detection & Response” (ADR), why it is catching on and where shift left went wrong.

  • How ADR may be more intuitive than some of the other AppSec acronym categories we’re used to.

  • Naomi’s perspective as someone with a focus on Product and background as a practitioner when it comes to pain points that emerge when it comes to how the industry has implemented “shift left”.

  • How the rise of application vulnerability exploitation as seen in reports such as DBIR and M-Trends has contributed to a shift to ADR and emphasis on runtime visibility and context.

  • How SOC/SIEM tools historically have missed visibility into the Application layer, and the impacts this has led to when it comes to incident response and effective risk mitigation.

  • The cultural shift of getting SOC teams more involved in App-level incidents and utilizing ADR metrics, tools and insights.

  • The rise of AI in terms of software development, with AI poised to produce up to 80% of code in the coming years and the impacts AI will have for better or worse on AppSec.

  • Contrast’s Software Under Siege Report and the insights associated with application probes, viable attacks and how organizations can take a threat-informed approach to defense.

  • The reality that WAF and EDR isn’t “good enough” when it comes to protecting the application layer and how attackers have increasingly figured out to bypass these controls amongst a lack of visibility defenders have of runtime production environments.

Discussion about this video

User's avatar