Tech Lead Journal cover image

#138 - Building Application Security Program - Derek Fisher

Tech Lead Journal

CHAPTER

How to Securing the Development Lifecycle

Security can be done in a hundred different ways, and there can be any combination of tools. What is the business budget tolerance? And what is your risk as an organization? If you're a company that has no sensitive data, you are not processing credit cards. There's no sensitive information. The way I usually try to approach it is that think about what are you trying to discover? DAST or IAST, get a penetration test. Software composition analysis should always be integrated.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner