Internal security trainings and awareness awards | ESM part 7

Conduct recurring security trainings Videos and online presentations are good, but nothing can really replace quality in-person meetups. Show as many demos as possible and don’t stick do overloaded PowerPoint presentations which put people to sleep. It’s fine to share raw technical details as a recap materials, but while starting out you must make people … Continue reading Internal security trainings and awareness awards | ESM part 7

Make security simple | ESM part 5

  Simplify it for them Security is often perceived as complex and cumbersome which makes engineers unwilling to work on it. In order to get things done you need to simplify and carefully explain your requirements. Strive to make it easier to build secure products because cheaper it is to add security, more likely it’ll get … Continue reading Make security simple | ESM part 5

Outline SDLC/NDLC improvements | ESM part 4

  Make it clear that security is a cost like any other in SDLC Security shouldn’t be seen as “addition” to the product development. It’s a part of it like all other activities and can be counted as a part of Quality Assurance, because nowadays customers demand high quality products and safety is one of elements … Continue reading Outline SDLC/NDLC improvements | ESM part 4

Build credibility and learn business language | ESM part 3

  Avoid confusion and FUD at all cost Credibility is something you’re building from the day one to the last day of your career. Even if you’re great industry expert, you still need to build your internal reputation from the ground up by working nicely with people in your organization. Crucial thing you need to learn … Continue reading Build credibility and learn business language | ESM part 3

Educate executives and middle-management first | ESM part 2

  Set common goals with management and executives It rarely happens that engineers themselves don’t want to build security into their products for no reason. The problem is that very often in startups and SMBs, middle management isn’t held responsible for product security, and the only thing they’re rewarded for is if the feature-rich product … Continue reading Educate executives and middle-management first | ESM part 2

Guide into Effective Security Management

After 10+ years in IT and 5+ in InfoSec I’ve learnt that for security initiatives to be effective, security must one of the core values of corporate culture. Security professionals can’t achieve their greatness if they’re not being actively supported by all stakeholders across the entire organization and if other employees don’t feel ownership for … Continue reading Guide into Effective Security Management

Start small and early | ESM part 1

  Start small Take baby steps to show everyone in your company that security doesn’t need to be tangled and complex. If you show people that it takes 3 clicks to secure their computer more, their mindset will change and they’ll be eager to implement more of such hassle-free solutions. Do the things that have … Continue reading Start small and early | ESM part 1

How to safely use EFSS solutions

Shameless plug — If you’re a fan of storytelling, I encourage you to read my previous article which is kind of a preface to this one: Software complexity as an enemy of security. However, it’s not required to know the preface because both of them have an individual value. I’ve been in EFSS‍ (Enterprise File Sync and … Continue reading How to safely use EFSS solutions

How to maximize ROI of Bug Bounties and penetration tests

I’ve been doing security bug hunting, penetration tests and managing in-house bug bounty programs for various companies, for over half a decade already. During that time I learnt that it doesn’t really happen too often that hiring company knows exactly what to do with security engagements results. I’d like to help and suggest what you … Continue reading How to maximize ROI of Bug Bounties and penetration tests

Peerlyst ebook: Essentials of Cybersecurity

Essentials of CyberSecurity is a crowdsourced ebook written by @Peerlyst community. I wrote the chapter ‘Building corporate security culture’ with following preface, which should give you a solid context for the message I tried to convey in my article. All those years in InfoSec taught me that for security initiatives to be effective, security must … Continue reading Peerlyst ebook: Essentials of Cybersecurity