www.infosecinstitute.com
Open in
urlscan Pro
162.159.134.42
Public Scan
Submitted URL: https://click.e.infosecinstitute.com/?qs=130513f0b78368c99f783409a0cbbff1e9aa0aa05d904437b38c5a08a5568e55afeef503b2599f1c2765964f1050...
Effective URL: https://www.infosecinstitute.com/podcast/moving-from-shift-left-to-born-left/?utm_source=marketing%20cloud&utm_medium=email%20bla...
Submission: On April 10 via api from US — Scanned from DE
Effective URL: https://www.infosecinstitute.com/podcast/moving-from-shift-left-to-born-left/?utm_source=marketing%20cloud&utm_medium=email%20bla...
Submission: On April 10 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* 708.689.0131 * Contact us * Login * Partners * * Products Back Empower employees with knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources. Book a meeting * Security awareness training * Pre-built training plans * Compliance, industry & role-based training * Custom education * Personalized learning * Languages * Gamified learning * Phishing simulator * 1000+ phishing templates * Simulation types * Phishing email reporter * Reporting & assessments * Dashboard reports * Security culture survey * Assessments * Learner analytics * Integrations & automation * Learner management * Threat response orchestration * Integrations * Global administration * Browse all training * Pricing Upskill and get certified with unlimited access to 1,400+ hands-on cybersecurity courses and cyber ranges. Book a meeting * Role-guided training * Infosec Skills Roles * NICE Work Roles * Cyber ranges & labs * Certifications & CPEs * Skill assessments * Skills guarantees * Browse all training * Pricing * Tools & resources * Role & Career Path Clarity Study * 2021 IT & Security Talent Pipeline Study * Course catalog * Talent development playbook * Free account sign up Upgrade to a boot camp for live, instructor-led training guaranteed to get you certified on your first attempt. Book a meeting * Most popular boot camps * CISSP Boot Camp * Security+ Boot Camp * Ethical Hacking Boot Camp * CCNA Dual Cert Boot Camp * CASP+ Boot Camp * Most popular boot camps * CCSP Boot Camp * CISM Boot Camp * CySA+ Boot Camp * PMP Boot Camp * Network+ Boot Camp * Browse all boot camps * Boot camp schedule * Infosec certifications * DoD 8570 certifications * Team pricing * Solutions Back * By organization type * For security & IT teams * For government & contractor teams * For MSPs & resellers * By need * Security awareness * Phishing simulation * IT certification * Compliance & framework * DoD 8570 certification * Cybersecurity skills development * By training type * Security awareness training * Technical training & certifications > I have been using Infosec Skills to gain more knowledge and insight to > prepare myself for the PenTest+ exam. I’d recommend this to anyone looking > for a training resource for themselves or their teams. — Lloyd C. Certify your team with one of the most trusted award-winning cyber security training institutions. * * * * * * Tools & resources Back Free tools & downloads * Security awareness & training tools Phishing Risk Test Security awareness ROI calculator Security awareness training plans Security awareness buyer's guide * Catalogs Skill development and certification course catalog Security awareness training catalog * eBooks Cybersecurity interview tips Security awareness, behavior change and culture CISSP exam tips from students and instructors CMMC: Everything you need to know * Reports & whitepapers Developing a strong cybersecurity culture The ransomware paper 12 best practices for implementing security awareness Cybersecurity Culture — Quantified How to secure your software faster and better * Posters Work Bytes security awareness posters Security awareness tipsheets * Plans & vendor assessments Cybersecurity talent development playbook 2023 GigaOm Radar for Security Awareness and Training IDC MarketScape: U.S. IT Training Services 2023 Vendor Assessment Resources * Cyber Work Podcast * Webinars * Blog * Case studies Featured webcast * About us Back * Leadership * Newsroom * Recognition * Industry alliances * Community * Infosec Insiders * TechExams * YouTube * LinkedIn * Facebook * Twitter * Instagram * Partners * Events & webinars * Careers * Infosec Gives * Scholarships & awards * Infosec Skills Development Awards * Infosec Security Awareness Awards * Infosec Accelerate Scholarship Program Reduce human risk and empower employees with Infosec's newest security awareness training series: Work Bytes Demo Now Book a Meeting MOVING FROM “SHIFT LEFT” TO “BORN LEFT” | GUEST DAVID MELAMED David Melamed of Jit brings us a new wrinkle in our ongoing series of developer security topics! Melamed says we should move beyond “shift left,” shifting the security earlier in the CI/CD pipeline, into “Born Left,” a platform in which security tools are in the hands of developers at the point of creation. Melamed talks about his early programming experiences, his Ph.D. in Bioinformatics, and the delineation of responsibilities between developers and the DevSec team. All that and a bit of CTO talk. 0:00 – Moving from “shift left” to “born left” 3:05 – How David Melamed got into cybersecurity 6:00 – Choosing your cybersecurity job path 11:15 – Daily work as a cybersecurity CTO 13:02 – How to become a cybersecurity CTO 15:10 – Keeping a company on track 16:40 – DevSecOps shift left to born left 21:08 – Born left, and overall security 23:13 – Accountability for developers 25:07 – Application security and born left 29:33 – What will DevSecOps and born left look like in the future? 31:00 – How to work in software development security 34:35 – First steps to a cybersecurity development job 35:30 – What is Jit? 38:33 – Learn more about Melamed 39:08 – Outro – Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast * Transcript Transcript * [00:00:01] Chris Sienko: Is Cinderella a social engineer? That terrifying monster trying to break into the office? Or did he just forget his badge again? Find out with Work Bytes, a new security awareness training series from Infosec. This series features a colorful array of fantastical characters, including vampires, pirates, aliens and zombies as they interact in the workplace and encounter today’s most common cyber security threats. Infosec created Work Bytes to help organizations empower employees by delivering short, entertaining and impactful training to teach them how to recognize and keep the company secure from cyber threats. Compelling stories and likable characters mean that the lessons will stick. Go to infosecinstitute.com/free to learn more about the series and explore a number of other free cyber security training resources we assembled for Cyber Work listeners just like you. Again, go to infosecinstitute.com/free and grab all of your free cybersecurity training and resources today. Today on Cyber Work, David Melamed of Jit brings us a new wrinkle in our ongoing series of developer security topics. David introduces us to the idea of moving beyond shift left, shifting the security earlier into the CI/CD pipeline; and into the concept of born left, a platform in which security tools are in the hands of the developers at the point of creation. David talks about his early programming experiences, his PhD in bioinformatics and the delineation of responsibilities between developers and the DevSec team. All that in a little bit of CTO talk today on Cyber Work. [00:01:38] CS: Welcome to this week’s episode of the Cyber Work with Infosec podcast. Each week, we talk with a different industry thought leader about cyber security trends, the way those trends affect the work of infosec professionals while offering tips for breaking in or moving up the ladder in the cyber security industry. Dr. David Melamed is the CTO and co-founder of Jit, the continuous security platform for developers. Over the past 20 years, David has been a full stack developer, a CTO, a technical evangelist mostly in the cloud and specifically in cloud security. He has worked for leading organizations such as MyHeritage, Cloudlock, acquired by Cisco, and led the advanced development team for the CTO of Cisco’s cloud security. This is a 500 million ARBU. David, thanks for joining me today. Welcome to Cyber Work. [00:02:26] David Melamed: Thank you. I’m very glad to be here. [00:02:29] CS: Yeah, just to give the listeners a little preview. We’re doing a bit of developer security DevSec, AppSec, all that sort of thing. David pitched us on the idea of moving from a shift left, which is to put the security portions of the developer pipeline further left in the process, I.E. earlier, into something that he is calling born left, which is sort of baking the security process into the entire system. Before we get into that, I just want to sort of start with your own origin story. How did you first get interested in computers and tech? Because I see, in college, you started out studying biology. You had a master’s in biochemistry and molecular biology and then a PhD in biomathematics, bioinformatics and computational biology. Obviously, these all probably have a strong tech and computer component. But I don’t actually know what all those degrees are. First of all, could you tell me about bio mathematics, bioinformatics and computational biology? And how they sort of tied into your interest in computers and tech? [00:03:37] DM: Yeah, sure. Let’s start with the fact that I’ve been passionate about technology since I was a kid. Actually, I got my first computer at the age of 10. And it was some kind of educational toy made for kids, which included a lot of questions about general knowledge. But the most fascinating part about it was that it included some programming language, basic. This is basically the first time I started to get interested into programming. And at the same time, I was a big fan of an educational animated series that you may know called Once Upon a Time… Life, which is about the human body. And so that was basically what drove me to start my studies in biology. But every time I had this hobby of computer science, and it’s only at some point that I managed to mix both, both my hobby for computer science and my studies and ultimately got a PhD in bioinformatics. And that was actually eye-opening for me in terms of understanding how to apply programming to something like a real-life use case. Also, lit inside me the sparkle about creating, innovating and building software. [00:05:05] CS: Mm-hmm. Yeah. Just to catch me up. Bioinformatics, is that something to do with like data collecting around sort of topics in like sort of biology and – [00:05:18] DM: Yes, exactly. It was mostly about genomics. Collecting a lot of data around genes and then applying an automatical model. For example, my PhD was about showing the DNA curvature with different models and gene expression for yeast. Something really applied. Trying to apply computer science to biological problems. [00:05:45] CS: Yeah, that makes sense when you mentioned that it’s related to sort of genome issues. Because that’s certainly the most number-crunch-intensive biology thing we’re working at right now. From your academic career, I want to briefly turn to your professional career. Because, again, this is how our guests get to know you and sort of seeing your career journey. There’s a pretty natural progression as far as I can tell. You started as a web developer/project manager for MediFirst. Then backend architect for subscription-based ancestry website, MyHeritage. Followed by a series of Chief Technology Officer roles. Can you tell me how you chose each of these roles and how they kept you on the path that you wanted to be on? [00:06:27] DM: Yeah, sure. Right after getting my PhD, it really felt natural for me to look for a job related to the biological field. That’s why I kind of joined the first startup called MediFirst, whose purpose was to build medical software. Because in addition to provide me with the great feeling of helping people, it actually gave me a really good overall view of how to build a software from talking to the doctors to kind of understand their needs and then build the product, supporting it. The whole the whole process was kind of really interesting from end-to-end. And then I moved to Israel. I was originally from France. Moved to Israel, got married and found another very promising startup called MyHeritage. Which again, kind of the same theme. Beyond the commercial aspect of the company, it kind of helps uh building family trees and reunite families worldwide. [00:07:34] CS: Right. Okay. [00:07:35] DM: Again, still in the magical field but a little bit further. And there, I learned a lot about how to be a back-end developer and just more about scaling issues. Because family trees worldwide, there’s a lot of data there. Then I got the opportunity to be a CTO the first time. And I learned a lot about cloud. And I did a lot of things as part of being a CTO. It was a very young startup. And so, frontend, backend, everything. This was my day-to-day. And beyond that, it also gave me a good understanding of the business, which is something that I didn’t have before. That’s the first time that I actually thought about starting my own startup. But I wasn’t a founder there. I was only CTO. A couple of months afterwards, I decided to jump into the cybersecurity field. And this is where I joined Cloudlock. I was very quickly in the CTO office there. And then it was acquired a couple of years afterwards by CISCO. And I continued working for the cloud security CTO office basically for four years until the Stars aligned and I decided to start my own startup together with the three co-founders of Cloudlock and a fifth co-founder. And that’s really got me super excited. And this is where I am now. [00:09:20] CS: I want to drill down in a minute just more about what a CTO does. Because, again, we’re helping our listeners to understand what the different job roles are so that they can sort of decide where they want to focus their studies and their experiences. But it sounds like it was a pretty natural progression. But do you feel that you specifically chose your career path based on the work you do now? I.E., you always wanted to found a company? Or did you choose your job roles knowing that this was the type of information you need to be able to do that? And then sort of adding on to that – I guess that’s it. Yeah. No. I mean, which came first? Were you always sort of moving towards co-founding? Or did that just kind of happen as you were sort of learning and on your journey? [00:10:11] DM: I would like to answer to you that this is something that I thought about 20 years ago. But it wasn’t the case. It’s actually really something that came naturally with the jobs I kind of tasted a little bit when I was CTO. But it wasn’t the right start, the right setup. And then I learned more. And the more I learned and the more I saw how startups are working, the more it actually got me into it. And when I got the chance, I just seized it. [00:10:40] CS: That’s great. Yeah. We’ve had a few people on the show who sort of described themselves as serial startup creators. They’ve done three, four, five startups in a row and then they just jump to the next one, jump to the next one. But this sounds like you were interested in – obviously, you talked about biology, and genealogy and the intersections with tech. And it just sort of chose you almost, the company calling. We talked to a fair few CISOs, chief information security officers; and CEOs chief executive officers, but we don’t get as many chief technology officers on the episode. For listeners who are just learning about this sector, can you tell our listeners about your day-to-day work as CTO at Jit and how that work differs, if at all, from past CTO roles that you held at companies that weren’t toned by you? [00:11:31] DM: Yeah. I would start by saying that the role of CTO is kind of one of the most versatile that I know. My day-to-day is really dynamic. It really pans on the priorities. I’m trying to constantly assess how to support the various teams in the company, whether it’s engineering teams doing some consulting for them regarding technology and feature implementation or talking to architects. Supporting customers, of course. Everyone is customer obsessed. We’re too, of course. And beyond that, I’m also trying to help with strategical conversation about technical partnerships, or preparing conference talk, or podcasts like this one. As you can see, really rather busy days. The difference between this role and the past role, I would say that, here, in addition to being CTO, almost a co-founder. And so, the big difference is that I have a different impact on the company. Whether it’s in the vision. Talking to investors, something that wouldn’t happen otherwise. I’m really trying to be a joker here and help everywhere I can. This is kind of my muzzle here. How can I help? Right? [00:13:02] CS: Right. Speaking in a more abstract sense, what are some of the big responsibilities of a CTO in terms of the types of experiences, and certifications and qualifications you would need to have to be considered as an interviewable candidate for your type of role? [00:13:19] DM: That’s a great question, because, as I said, the role is very versatile. And so, I know very different types of CTOs. I know CTOs that are more hands-on. Those that are more strategic, business oriented. But I would say that, overall, I think that having a deep and wide technical background really helps. It’s something that you want to be on top of what’s going on. And so, you need to follow the technical trends. One of the key elements is to be able to constantly focus on what’s the most urgent and important. It may be true for a lot of roles. But as a CTO, because you can have an impact in very different areas of the company, it’s really tempting to be drawn into various tasks. And at the end [inaudible 00:14:13]. I think that thinking out of the box is something that is a really nice addition to the role. Being good at multitasking, for example, is also something. I have a lot of context switch and being able to constantly – I know how to refocus and work on different stuff at the same time. That’s really, really something important to be successful in this role. [00:14:38] CS: Yeah. Yeah. And I think that’s something we’re keeping in mind if you’re doing any kind of c-suite role, but especially CTO here, is that it’s really important not to be sort of pulled into everyday emergencies. You have to be able to, I suppose, kind of lift over it and think in terms. Because as someone who is terrible at refocusing, it’s real easy to just jump from crisis to crisis and then suddenly your three-month long-term plan is still on point one or whatever. Do you have any particular strategies or tips for CTOs or c-suite people trying to keep the people who are putting out the fires on track with their long-term goals and the company’s long-term goals? [00:15:23] DM: There is one thing. Like beyond doing something like OKRs every quarter, there is something that I started to do not a long time ago that really helps focusing, is that every Sunday, in the morning, I’m writing an email to myself and actually to the whole leadership in order to get some visibility about what are my goals for the week. Because that really helps focusing. And I’m getting back to this almost every morning to see how much I managed to get some progress in those goals. That helps me focusing on the things that are the most important to me. And also, it also helps me reassessing every week what should be the goal for the week. [00:16:06] CS: Yeah, that’s great advice. I think you can’t go wrong by having a really, really clear picture in your head of what your week or your month has to look like. Because then you know how to sort of push through sort of these immediate crises and keep on top of things. [00:16:23] DM: Yeah. And also, the fact that I’m sending this email to the whole leadership team, it also helps with setting expectations. They know exactly what they can expect from me in terms of time allocation. And so, hopefully that I don’t get a bothered too much. [00:16:38] CS: Yeah, absolutely. I want to move over to our topic of the day here. One of the things I mentioned on our last episode with Nir Valtman is that people in the DevOps space and, for all purposes, DevSecOps specifically, are always kind of listening to other thinkers in the space and are always building on each other’s ideas. And I say that because we’ve now had several DevSecOps and developer guests in a row each of whom, like yourself, heard past episodes and wanted to keep the conversation going. Nir, my past guest, talked about creating security protocols in the developer space with a view on how developer behaviors can be utilized productively. And how they need to keep in flow while developing? And how do we avoid severely compromising the security of allowing these sort of time savers into the flow. But as I said at the top of the show, your philosophy and the tools you’re creating specifically aim at shifting the overall tactics of software development from shift left. I.E. moving security earlier in the pipeline. And changing instead to born left, in which security is more seamlessly integrated into the process in a way that doesn’t require lag times and slow down a project. David, can you tell me more about the concept of born left? What’s the actual process at work here? [00:17:59] DM: Yeah, sure. First of all, shift left is a trend that everyone is talking about. It’s built on the idea that developers needs to get information about the vulnerabilities of their codes before it hits production. The earliest you get this information, it actually helps you reducing the cost and the time of fixing the issues. And mostly, it means that it starts by running the tools inside – some secret tools inside the CI/CD Pipeline. And sometimes if you’re actually taking that even further, you can also use some ID plugin in order to actually get alerted right away while you’re working on the code. But one of the problems that I witnessed a lot of time is that the ones that are picking those tools are usually the AppSec team and they’re not always sitting in the engineering organization. And so, that leads uh to a lot of developer frustration and friction. Because, basically, the AppSec team is trying to catch up all the time with developers towards their main goal is basically to deliver, to build the product and to deliver it to production. And so, if you’re a high-velocity team and you want to deploy your product multiple times a day, you probably are putting in place a lot of automation. You have infrastructure as code. You have a lot of processes that helps you doing that. But the kind of poor prioritized – the thing that is still not fully automated is security. And so, the fact that the AppSec team is kind of slowing every time, it is really a source of frustration. The concept of born left is basically a process where not only you’re moving, you’re shifting the ownership of security to the engineering team. You’re also embedding the whole security detection. All the aspects of security are now embedded in the software development life cycle. And so, at the end, developers can treat security just like another developer software bug. W what does it mean in practice? It means that you can add security basically from the first line of code. But developers can pick the tools that are friendly. That helps them also with fixing the issues that can be automated, that can be integrated very easily into the CI/CD pipeline. That doesn’t require them to enter into a different UI to see the results. All the things that at the end give them the proper information just in time in order to fix them. [00:21:07] CS: Got you. One thing you mentioned in our discussion before the show was that your born left process in part was an orchestration platform to allow lean startups to implement security tooling while reducing the burden on developers. As such, unless I’m reading this wrong, it sounds like this is more like a baseline coverage program for understaffed new companies. Is there any reduction in overall security quality by using the system versus having dedicated AppSec members doing the inspection and audit work themselves? [00:21:36] DM: Not really. The idea is that if you want to apply born life security in a viable way, you need some kind of platform that orchestrates all the required tools in order to have some kind of single pane of glass that would deal with all the aspects of product security in a consistent and centralized way. And so, on the contrary, it doesn’t reduce your overall security. It increases it. And the reason for that is basically that, nowadays, when you have security tools, most of the time, you’re also relying on developers so that they will integrate those tools into their repo, into the CI/CD. By having something that is centralized, you’re basically reducing the load on the developer to introduce those tools and you’re enforcing that at the level of the whole organization. And so, basically, all your assets are monitored in the same centralized way, the same consistent way. And so, it doesn’t reduce the security. You basically needs to decide what type of tools you want? How many tools? What areas you want to cover? And then you let the platform enforcing that policy consistently across all your assets. [00:23:02] CS: Got you. Well, yeah, I mean, turning to the developer side of the equation. And you basically just said this. But I want to reiterate it. You had a blog post where you said when developers build solutions for their own kind, they do things differently. After all, nobody understand the pains better than they do. As you were just saying, this sounds basically like born left is essentially putting the responsibility of security defects and issues into the hand of the dev team to resolve as they swim in the code all day and will find it easier to take on. Is there any concern here that devs will use this newfound autonomy to implement solutions that might be faster or more efficient but are less safe? Is there any accountability issue for quality at work here? [00:23:43] DM: I don’t really think so. Basically, if you’re looking at it, developers are ultimately the ones that are building the product. Now, usually, they’re not necessarily security experts. And so, if there are some security issues, that’s not because they’re doing that on purpose. They just don’t have enough tools, enough knowledge. And they are not getting the information in time in order to fix it. But if you think for a minute that you would provide them with all the information about the security vulnerabilities of their code while they’re working on it, and you also suggesting them what the fix can be, I don’t think it will actually be an overheads to fix them. They will definitely – no one wants to deploy code that is not secure in production. In the same way that they don’t want to deploy code with bugs in production. If you manage to provide them with the proper information at the right time while they’re working out without the overhead of context switching, basically you’re considering all the security tools like security review of a peer. And that would include also some suggestions for fixing. I think that’s all the developers will be able to fix them like they’re fixing any bug before production, you know? [00:25:07] CS: Okay. Within this framework, what role does an AppSec professional play if any? Are we looking to remove the sort of application security department in moving towards born left? [00:25:24] DM: I don’t think so. First of all, I think that if you’re thinking about what would be the most efficient engineering organization, there is definitely a place for AppSec. But the AppSec needs to be closer actually to engineering. It’s instead of uh sitting outside of it, especially for the part that is focusing on the product, you definitely want them to be as close as possible to the engineers. [00:25:54] CS: Got you. [00:25:54] DM: Now, AppSec, DevSecOps, they all need to be there. And they will be the one who actually can influence and impact what tools and what area of your product you need to secure. And if there’s some questions regarding how to fix, or can I ignore this vulnerability, they can definitely help there. I really don’t see a future where there’s no AppSec or DevSecOps. The fact that you have more automation is just a way to facilitate and help with the velocity. [00:26:30] CS: Okay. Yeah, I appreciate that. I’m trying to sort of square this all in my head. Apologies if I’m sort of stretching this out a little bit. Basically, what I’m hearing, and you can correct me because I might not be hearing it correctly, is that, by using born left, you’re dealing with security issues that are happening in the moment of creation. Things that are probably easily fixed with applications and solutions. Whereas the sort of SecOps, DevSecOps roles would be more of like an overall sort of security plan that would sort of look at like sort of like the final product and make sure that it’s secure? Or am I getting that wrong? [00:27:18] DM: No. You’re not getting that wrong. But if you’re thinking about, let’s say, adding security not on day one, at the end, you also have some kind of backlog that you need to deal with. You also have to prioritize the issues there. And though platforms can help with prioritization, at the end, I think that it’s also the role of the DevSecOps to actually help triaging the right thing in order to see what are the most important critical stuff you need to fix. [00:27:52] CS: Okay. In that regard, the platform, the born left platform type thing, is also sort of a prioritization thing. Because there might just be too many problems to fix and to still get it out on time. Is that sort of the idea? [00:28:09] DM: Yeah. The way I see things that, not everyone can introduce security from day one. That would be ideal. But if you’re not, then what should happen is that you’re getting the information about security issues in real-time. And so, you’re fixing the new stuff before dealing with the backlog. There are some physical backlog that you want to fix. But basically, you’re ensuring that you’re not increasing your security debt. And then as a separate effort, you’re dealing with the backlog. Because usually, a backlog is huge, you know? And so, you want to help with prioritizing the backlog. While on the other hand, you’re still uh dealing with the current new stuff that are coming – [00:28:54] CS: And also, you’re not adding to the backlog by just letting the errors go through. Okay, that helps. I’m trying to imagine it in my head. A little ADHD. And it almost sounds kind of like the way like Grammarly works. Grammarly doesn’t like change your writing style. But it’ll make sure that you hit those apostrophes in the right spot and stuff like that. There still has to be the overall sort of crafting of the app. And as you said, going through the backlog. Okay, that’s very helpful for me. I didn’t mean to sort of bang on that. But I wanted to make sure that we weren’t putting security people out of business or closing off their job opportunities. Near the end of your piece, you noted that born left is still in its infancy and is being improved in real-time. Using this approach, what do you see born left and your platform looking like in two, three or even five years down the road? In your prediction, would the entire process of DevSecOps look different by then? [00:29:53] DM: Well, I believe that in the future no one in its right mind will start a new project without introducing security from day one. [00:30:03] CS: Yes. Okay. [00:30:04] DM: From the first line of code. I think it will be an integral part of developing software. And like in the past, QA was something like an outside function. Usually not part of the development team. And progressively, it’s an integral part of building and deploying some code to production. And developers now are writing unit integration tests, end-to-end tests. I believe that, at the end, security will actually follow the same path. It will be part of the same embedded way of writing software. And like you’re writing unit test, integration test, you will write security tests. And you’re unsure that all the tools are in your environment. When you want to deploy some code using CI/CD, there will be the tools in production in the CI/CD pipeline from day one. [00:30:58] CS: Got it. That’s great. I appreciate the clarification there. That makes sense. I want to talk with regards to people entering this particular space. Because, again, I feel like we threw a lot at people. And especially if you’re a newcomer and so forth, for students and people trying to get into the software developer space and especially the security aspects of the job, or just being a developer that has a little bit of security in their toolbox. Can you talk about some skills, or experiences, or projects, or other indicators of competence that they should be doing and listing on their resume to help them stand out? [00:31:34] DM: Yeah, definitely. I think that one of the major drawbacks of most of the programming course that I know is that they’re not dealing with security. They tell you how to write either code that is clean, with good hygiene, that can support scale, with good design but they’re not really touching security. And so, for example, for any student that wants to have the first encounter with security, I would really encourage them to take a look at the OWASP top 10, which is no the most common risks that you can encounter when you’re dealing with code. And so, that’s one thing. And the other is basically getting familiar with the basic tool for code scanning, like static SaaS, SDK, dependency-check and secret detection. That would be my advice how to kind of stand out. Because most of the people that are applying for a job, usually they’re listing the frameworks or the language that they know. But very few are actually showing that they know how to write secure code. [00:32:49] CS: Right. Yeah. Yeah. And one of one our 12 sort of career paths is secure coder. And we’re always encouraging people even not – who don’t want to sort of lean right into that to still have that knowledge in their back pocket. I mean, there’s so many other applications for it. Yeah, I mean, do you think – because you were saying that there is – there is kind of that divide between like developers? And we say, “Oh, well, developers don’t need to know security stuff. Or they don’t know security stuff.” And so, we need to sort of like have this support thing. Do you think there’s a benefit to having developers have at least a little bit of security knowledge? And then vice versa, SecOps people having more than a little bit of like developer knowledge so that there’s more of a give and take there? [00:33:39] DM: Yeah, definitely. I think that, first of all, any company that has kind of evolved from a very immature in terms of security, to a little bit mature, or doing some compliance process needs to go through some security training. And so, yes, of course, it helps. If you have some basic background in security when you’re a developer, it’s definitely helping write secure code from the start and not having to deal with that afterwards. I think that if you have some great tool in your environment, they can definitely help you with getting the knowledge that you need. Every time you’re getting some vulnerability, you need to understand why it’s a vulnerability. And you can learn on the way. But definitely, starting with some basic baseline, it helps. [00:34:35] CS: Okay. I guess one last piece of advice I would like for people who are a little nervous about dipping their toe into this. Could you suggest like one thing they could do once they turn this recording off? What’s the first step they could do if they feel like they’re stuck in a help desk role? They feel like they’re stuck in their current job and want to make a big shift. What’s something that you could do online tonight, today, whatever, that would put you one step closer to being someone in a development space or the DevSec space? [00:35:06] DM: Well, like I said, beyond maybe asking some security questions to ChatGPT. I would say that going to OWASP is a great resource. You have a lot of tools there. You have a lot of code. So you can really experiment how security can work. You can see how code can be vulnerable and why it’s vulnerable. Definitely a great set of resources there. [00:35:29] CS: Nice. As we wrap up today, we discussed your job, task the CTO of Jit. And you talked about this platform for born left. But if you want to discuss your company more and go into more detail with the types of services you provide, here’s your chance to do so. [00:35:43] DM: Thank you. Basically, Jit is the only DevSecOps platform that is built by developers for developers. It comes with a lot of built-in security tools that are applicable to any cloud application where, basically, you can onboard and be operational minutes. And that’s really something that stands out when you compare to all the platforms. It’s based on a security as code framework. And the idea is that it’s very extensible and can support a lot of different tools. We’re currently orchestrating some tools. But the idea is that, at some point, we’ll open that to the whole committee. And so, anyone can add the tool that they. We’re not vendor-specific. [00:36:32] CS: Right. Right. Yeah. [00:36:33] DM: And beside that, our goal is to cover all the aspects of product security. Meaning we are currently covering code security, pipeline security, infrastructure security, runtime security. All these different aspects are covered under the same roof. And that’s something that is really important. Because as I said, if you have a single pane of glass, you can have really an overview of all the different fields. But what’s really important here is that the platform is very friendly for developers. And what I mean by that is to let the developer work in their own environment, in their native environment, and don’t need to go into another UI. That’s why we’re providing them with all the information about security in PR, in the PR, as comments really at the right time. Just in time for them to fix that. And hence, the name of the company, Jit, just in time. And beside that, we’re also offering a lot of visibility on your whole assets. And something that is very important when you’re thinking about security tools is that we’re also providing security performance KPIs in order to evaluate if, thanks to Jit, you’re basically progressing with your security posture. If you’re getting better. If you’re developers are doing a better job, thanks to the comments that we’re adding inside the PR and the suggestion for [inaudible 00:38:14]. They’re also learning with the time. And so, Jit is supposed to catch less and less security issues and the velocity will increase. [00:38:25] CS: Yeah, never a bad thing when we increase our security posture while making things easier. [00:38:31] DM: Yeah, definitely. [00:38:32] CS: Yeah. One last question, then I’ll let you get on your way here. If our listeners want to know more about David Melamed or Jit, where can they go online? [00:38:39] DM: First of all, they can find me on LinkedIn or Twitter. And if they want to know more about what we’re doing, visit www.jit.io or send me an email directly at david@jit.io. [00:38:53] CS: Great. And you encourage our listeners to get in touch with you? Because I know they will. I know they will. All of our past guests have said that they’ve had some very nice interactions with our listeners. I’m thrilled to hear that. Well, David, thank you for joining me today. I really appreciated you sort of breaking down some more innovations for DevSecOps here. [00:39:15] DM: Thank you very much. Thank you for having me. [00:39:17] CS: And thank you all who have been listening to and watching the Cyber Work podcast on a massive scale in 2022 and 2023. We’re awfully glad to have you along for the ride. Now before you go, I just want to invite you to visit infosecinstitute.com/free because we’ve got a whole bunch of free stuff specifically for Cyber Work listeners. Our new security awareness training series, Work Bytes, features videos with a host of fantastical employees, including a zombie, a vampire, a princess and a pirate. Making security mistakes and hopefully learning from them. Also, make sure to check out our free Cyber Security Talent Development ebook. It’s got in-depth training plans for the 12 most common roles, including SOC analysts, penetration tester, cloud security engineer, information risk analyst, privacy manager, secure coder and more. Lots to see. Lots to do. All you got to do is hit www.infositeinstitute.com/free and check it out for yourself. Thank you once again to David Melamed and Jit. And thank you all so much for watching and listening. Until next time, have a great week. [00:40:16] DM: Thank you. Free role-based training plans! Infosec recently developed 12 role-guided training plans — free for Cyber Work listeners. * SOC Analyst * Penetration Tester * Cloud Security Engineer * Security Manager * Information Risk Analyst * And seven more! Get all 12 training plans below. Download Now SUBSCRIBE TO PODCAST Apple Podcasts Google Podcasts Spotify YouTube FREE CYBERSECURITY TRAINING RESOURCES! Infosec recently developed 12 role-guided training plans — all backed by research into skills requested by employers and a panel of cybersecurity subject matter experts. Cyber Work listeners can get all 12 for free — plus free training courses and other resources. Get Free Resources WEEKLY CAREER ADVICE Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Booz Allen Hamilton, CompTIA, Google, IBM, Veracode and others to discuss the latest cybersecurity workforce trends. Learn More Q&AS WITH INDUSTRY PROS Have a question about your cybersecurity career? Join our special Cyber Work Live episodes for a Q&A with industry leaders. Get your career questions answered, connect with other industry professionals and take your career to the next level. Learn More LEVEL UP YOUR SKILLS Hack your way to success with career tips from cybersecurity experts. Get concise, actionable advice in each episode — from acing your first certification exam to building a world-class enterprise cybersecurity culture. Learn More * * * * * Products Infosec IQ Security awareness, culture & phishing simulator Infosec Skills Hands-on skill development & boot camps Resources Cyber Work Blog Events & webcasts Company Contact us About Infosec Careers Newsroom Partners Newsletter Get the latest news, updates and offers straight to your inbox. Thanks! You're signed up. * Infosec, part of Cengage Group — ©2023 Infosec Institute, Inc. * Trademarks * Privacy We use cookies to personalize content, customize ads and analyze traffic on our site. Privacy policy Manage Options Accept PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * FUNCTIONAL COOKIES * PERFORMANCE COOKIES * ONLINE BEHAVIOR ADVERTISING YOUR PRIVACY When you visit websites, they may store or retrieve information on your browser in the form of cookies. This information might be about your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your privacy, you can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Infosec, a Cengage Group company. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off. They are usually only set in response to actions made by you such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as a result. These cookies do not store any personally identifiable information. FUNCTIONAL COOKIES Functional Cookies Inactive These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third-party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. PERFORMANCE COOKIES Performance Cookies Inactive These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. ONLINE BEHAVIOR ADVERTISING Online Behavior Advertising Inactive These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button BACK Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All