She Said Privacy/He Said Security

From Codes to Security by Design: Navigating Software Cybersecurity


Listen Later

Shanti Ariker is the Chief Legal Officer of JFrog (NASDAQ: FROG), where she leads the company’s global legal policy development and compliance. She is a solution-creator with global legal expertise, leveraging more than 20 years of experience working with high-growth technology companies to act as a trusted business advisor to CEO and executive teams and public company Boards of Directors.

In this episode…

The rise in cyber risks is placing increased pressure on companies to closely examine their software and codes and integrate security measures into every stage of the software development process. And, with the SEC cyber rule requiring  publicly traded companies to report material breaches, there’s an increased need for companies to perform thorough due diligence on their vendors, especially those incorporating AI into their products. So, how can businesses protect their supply chains in such a volatile environment?

Supply chain security is not a one-time task but an ongoing process that demands continuous integration of security throughout the software lifecycle. Companies like JFrog, a software supply chain platform, recognize this and utilize a security by design approach to help companies reduce cyber risk by embedding security protocols into every stage of its software design process, securing each piece of code at the binary level before it reaches the end user.

In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels chat with Shanti Ariker, the Chief Legal Officer at JFrog, about the complexities of securing the software supply chain in today’s tech and regulatory landscapes. Shanti explains how JFrog embeds security by design principles into every stage of software development to help companies mitigate cyber risks, while enabling companies to conduct thorough due diligence on their suppliers' cybersecurity, legal, IT, and privacy practices. She also emphasizes the need for companies to implement a robust AI review process, particularly for third-party vendors incorporating AI into their products to gain a holistic review of the cybersecurity, data privacy, and regulatory compliance implications.

...more
View all episodesView all episodes
Download on the App Store

She Said Privacy/He Said SecurityBy Jodi and Justin Daniels

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

12 ratings


More shows like She Said Privacy/He Said Security

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,981 Listeners

Global News Podcast by BBC World Service

Global News Podcast

7,654 Listeners

TED Radio Hour by NPR

TED Radio Hour

21,892 Listeners

Pivot by New York Magazine

Pivot

9,278 Listeners

The Privacy Advisor Podcast by Jedidiah Bracy, IAPP Editorial Director

The Privacy Advisor Podcast

65 Listeners

The Daily by The New York Times

The Daily

110,759 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,929 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Serious Privacy by Dr. K Royal, Paul Breitbarth & Ralph O'Brien

Serious Privacy

23 Listeners

Privacy Please by Cameron Ivey

Privacy Please

28 Listeners

Surveillance Report by Techlore & The New Oil

Surveillance Report

95 Listeners

Hard Fork by The New York Times

Hard Fork

5,448 Listeners

The Dershow by Alan Dershowitz | Kast Media

The Dershow

2,081 Listeners

Masters of Privacy by Sergio Maldonado

Masters of Privacy

6 Listeners

"The Data Diva" Talks Privacy Podcast by Debbie Reynolds

"The Data Diva" Talks Privacy Podcast

16 Listeners