Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Shane Curran - Building Security Into The Beginning Of The Development Cycle (Turing Fest 2022)

Shane Curran - Building Security Into The Beginning Of The Development Cycle (Turing Fest 2022)

When it comes to creating, releasing, and maintaining software, startups are usually well-oiled machines. But this is not the case when it comes to securing software. Startups need to move fast but many developers still perceive security as a hindrance and a tax on progress, despite the meaningful increase in cyber risk that is created by neglecting to build secure software. Cool new features are useless if they are vulnerable to malicious exploits.

Head to www.turingfest.com to learn more about Europe's best cross-functional tech conference.

Turing Fest

August 15, 2022
Tweet

More Decks by Turing Fest

Other Decks in Technology

Transcript

  1. Overnight, they go from selling to customers who are using

    their product because they got a free hoodie…
  2. And they start selling to customers who ask you to

    fill out a security questionnaire before they even look at a demo
  3. Founders rush to get SOC 2 ISO 27001 PCI DSS

    GDPR ASDDFGJASDDSF compliant in a hurry
  4. But then startups buy compliance automation software, find an auditor

    and get compliant quick… all is well, right?
  5. Some time passes, and then you meet a Head of

    Security who looks a little bit less like…
  6. If you’re lucky, Hackerman will be a friendly Head of

    Security working for a potential customer
  7. Now, not only is Hackerman unhappy with your product —

    compliance teams and lawyers are too! What a mess!
  8. But… anybody who steals the key and encrypted data now

    has the original sensitive data 🥷
  9. Implementing encryption properly is hard You have to… 1. Pick

    which open source library to use 2. Store the keys yourself 3. Still handle data in plaintext before encrypting it 4. Decrypt the data every time you want to use it
  10. Developers should be empowered to use it, and to own

    the security for their own software end-to-end