Skip to content

CISO Thoughts with David Lindner - April 15

    
CISO Thoughts with David Lindner - April 15

Insight #1

"Again we had an instance where a CVE was not appropriately fixed and a year later a new CVE was released for the same problem and a better fix. This brings back memories of log4j and numerous updates over a 2 week period. Because these sorts of things are common (and because new zero-days come out all the time) you need to have a solid plan in place to mitigate your risks of exploitation with technologies such as RASP. It’s one critical piece to your mitigation control layers."
 

Insight #2

"Running a scan against your developers' code and handing them a report with unverified findings (full of false positives and unreachable vulnerabilities) does nothing but create tension between the security team and the engineering team. As our security processes and tooling evolve with the speed of engineering, it is imperative we find ways to get developers actionable results as part of their workflow. The waterfall approach to application security is dead."
 

Insight #3

"If your source code is leaked, your first worry should not be what’s in the source code. Your worry should be if the malicious actor is still roaming around your environment and what else they accessed. Immediately hire outside help for incident response and forensics analysis."
 
 
David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.