Skip to content

Cybersecurity Insights with Contrast CISO David Lindner | 5/13

    
Cybersecurity Insights with Contrast CISO David Lindner | 5/13

Insight #1

"I recently attended a conference and overheard a conversation where someone said, “Security by obscurity is not security, but it works.” It may help prevent your everyday script kiddie but a determined malicious actor would barely blink. Please, before you start using obscurity for your controls, make sure you completely understand your threat model and who your threat actors may be. You will quickly realize why obscurity does in fact NOT work."
 

Insight #2

"NIST recently posted a request for information (RFI) to enhance their Cyber Security Framework (NIST CSF). One of the most commented additions was that NIST CSF lacked metrics. As security becomes more of a business enabler, it is imperative we start measuring more, and building metrics into the NIST CSF is a no-brainer."
 

Insight #3

"As security pushed more and more left, and requirements lie on developers to create secure code out of the gate, open-source tooling for security will become more important. There are lots of great commercial products available, but not everyone can afford all the products they may need to fully support a secure development process. Purchase the tools you can, and look for open source products to help supplement or cover gaps you may have."
 
 
David Lindner, Chief Information Security Officer

David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.