Skip to content

CISO Thoughts with
David Lindner

Contrast Security CISO David Lindner provides his top three weekly insights for CISOs, developers and the security community here. These are updated every Friday, so be sure to check back for the latest news on what's top of mind in AppSec and DevSecOps.

The latest insights as of December 20, 2024:

 


boxing gloves

 

 

Insight No. 1: Forget the hype. Cloud security is a battlefield, and you're woefully unprepared.

Let's cut the crap. Everyone's talking about cloud security, but most organizations are still playing catch-up. You think those cloud providers have your back? Think again. They're too busy raking in profits to worry about your data. So what's a CISO to do? First, ditch the complacency. Those legacy security tools you're clinging to? They're useless in the cloud. Next, get your team up to speed. Cloud platform protection, data security, architecture design — these aren't just buzzwords; they're essential skills in the fight for cloud dominance. And don't forget the basics. Security engineering, risk assessment, Application Security —these are the foundations of a solid security posture, whether you're in the cloud or on-prem.

Insight No. 2: The SEC's disclosure rules? More like a bureaucratic nightmare!

Those SEC cybersecurity disclosure rules are a bureaucratic nightmare, a maze of 8-K filings and 10-K forms designed to keep lawyers and consultants happy, not necessarily make us more secure. But while the U.S. Securities and Exchange Commission (SEC) drowns us in paperwork, attackers are busy innovating and exploiting our vulnerabilities. We need tools that give us a real edge, not just check compliance boxes. Contrast Application Detection and Response (ADR) does exactly that. It's about deep-diving into applications, hunting hidden threats and shutting them down before they cause damage. It's about real-time threat visibility and building a security posture that's truly battle-tested, not just compliant on paper.

bureacracy

 

throwing out the rule book

 

Insight No. 3: CISOs, are you ready to throw out the rule book and get a little bit dangerous in 2025?

Compliance is breathing down our necks. GDPR, CCPA, HIPAA — the alphabet soup of regulations is enough to make anyone's head spin. But here's the truth: Compliance doesn't equal security. Sure, ADR can help you check those compliance boxes. But let's talk about the real power of ADR. It's about uncovering the hidden threats lurking in your applications, the ones that traditional security tools miss. It's about hunting down malicious activity in real-time, not just generating reports for auditors. It's about building a security posture that's not just compliant, but truly resilient. So, let's use ADR to not only satisfy the regulators but also to push the boundaries of security. Let's make 2025 the year we stop playing defense and start taking the fight to the attackers.

green-green-bg

Cybersecurity Insights with Contrast CISO David Lindner | 12/13/24

green-green-bg

Cybersecurity Insights with Contrast CISO David Lindner | 11/22/24

green-green-bg

Cybersecurity Insights with Contrast CISO David Lindner | 11/15/24

David Lindner

Chief Information Security Officer, Contrast Security

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.

Incident Response Solutions from Contrast

contrast-protect

Contrast Protect

Always-on application and API protection from targeted attacks with no code changes required.

contrast-assess

Contrast Assess

Flag underlying vulnerabilities in applications before it becomes a disclosed CVE or major incident - all without having to launch a single scan.

contrast-scan

Contrast Scan

Code analysis that’s tailor-made for modern CI pipelines that delivers 10x faster scans, and actionable findings to ensure rapid fixes.

contrast-sca-02

Contrast SCA

Automatically catalogue your third-party software risk across the software lifecycle - from build, to test, through production.