
Sign up to save your podcasts
Or
In episode 72 of The Cyber5, we are joined by DoorDash Application Security Manager, Patrick Mathieu.
We talk about threat intelligence's role within applications security programs, particularly programs focusing on fraud. We discuss the importance of prioritization between what could happen, as often seen in penetration testing, and what is happening, as often seen with threat intelligence.
We also talk about the different types of internal and external telemetry that can be used to drive a program and discuss the outcomes that are critical for an application security program to be successful.
Three Key Takeaways:
1) Application Security Overlaps and Threat Intelligence Shortcomings
Fraud programs exist to save money and application security programs exist to discover and mitigate cyber vulnerabilities. However, most of the same problems are derived from the same weaknesses in the application architecture during the software development lifecycle (SDLC).
Any application development team needs to know the following:
Threat intelligence falls short in collecting against these actors because it’s so specific to business logic and not an organized crime group with greater notoriety or known tactics, techniques and procedures (TTPs).
2) Common Vulnerabilities in Application Security Pertinent to Fraud
3) Application and Security Engineers Must Communicate
5
2323 ratings
In episode 72 of The Cyber5, we are joined by DoorDash Application Security Manager, Patrick Mathieu.
We talk about threat intelligence's role within applications security programs, particularly programs focusing on fraud. We discuss the importance of prioritization between what could happen, as often seen in penetration testing, and what is happening, as often seen with threat intelligence.
We also talk about the different types of internal and external telemetry that can be used to drive a program and discuss the outcomes that are critical for an application security program to be successful.
Three Key Takeaways:
1) Application Security Overlaps and Threat Intelligence Shortcomings
Fraud programs exist to save money and application security programs exist to discover and mitigate cyber vulnerabilities. However, most of the same problems are derived from the same weaknesses in the application architecture during the software development lifecycle (SDLC).
Any application development team needs to know the following:
Threat intelligence falls short in collecting against these actors because it’s so specific to business logic and not an organized crime group with greater notoriety or known tactics, techniques and procedures (TTPs).
2) Common Vulnerabilities in Application Security Pertinent to Fraud
3) Application and Security Engineers Must Communicate