Blog

Stop disrupting my workflow! How you can get the right security training at the right time

Matias Madou, Ph.D.
Published Jul 01, 2020

Think about the last time you were at work, perhaps in a software project team working to an impossible deadline. And then, your manager comes along and says there is some mandatory security training to do, and that it needs to be shoehorned into your workday on top of everything else.

They know it, and you know it. It's a huge PITA, but for compliance reasons, you'll be playing some boring training videos in the background while you keep coding, tuning in and out of both tasks and giving your full attention to neither. This is a common scenario; it's highly disruptive, and it wastes everyone's time. Most security training is too generic, and it's easy to ignore something that bounces in and out of a workday with no real value.

As a company, our goal is to bring a better, more effective type of security training to you, and this is born from knowing exactly what it's like to be disengaged from what the AppSec team tells you is important, when each of your priorities is misaligned. What is interesting, though, is that we started to think about what we could do to reduce the barrier to getting training when you need it - even with our full platform, there are a few steps involved that take you away from your work, at moments where you still need a helpful push but can't dedicate a block of concentration to a training session.

We looked at how micro-learning could be implemented into your workflow, in the IDE or issue tracker, in a more seamless way. And this is what we came up with:

This is based on Just-in-Time (JiT) principles, wherein you're served the right knowledge, at the right time for it to be immediately effective and useful. It's the opposite of the just in case approach to learning, which is often a state of information overload that takes away precious time and headspace for building features.

Quality code is secure code, and if you need a non-invasive security sidekick to collaborate with occasionally, then it might be worth your while to take it for a test drive.

Eliminate the barriers, and bring the training to you.

Cybersecurity might be an interest for some, but not everyone. And no-one should expect developers to become security experts - that still remains the job of specialist AppSec teams. However, security-aware developers are revered for their skills, and the protection they can offer organizations right from the code-building stage. It's a position in high demand, and you can build the foundations over time with contextual micro-learning.

Now, if you're thinking about integrated training as more like Clippy (may he rest in peace), then it's important to note that in the case of Secure Code Warrior's integrations, they're built by developers for developers, so the irritation factor has been considered and obliterated.

Let's check it out in action:

Secure Code Warrior | GitHub Integration

Secure Code Warrior for Github inspects code for Common Weakness Enumeration (CWE) or OWASP references in the labels, issue title, and body of issues to display contextual just-in-time training. The way it works is if a vulnerability reference is found, a comment will be posted on the issue to assist in swift resolution and prevention of recurring vulnerabilities. It integrates with the issue without disruption of your process, or making you jump through hoops for a solution.

And if you use Jira, the process is similar:

SCW for Jira Server
SCW for Jira Cloud

Now, for the incumbent security-aware superstars, it's important to remember that it's not all on you to make magic happen. You're going to need support, training, and a reason to take security seriously and get it into your own workflow. Luckily, this is all part of a functioning DevSecOps process, and lots of organizations are already taking note. Why not get a head start?

Download them now, and let us know what you think.

View Resource
View Resource

We started to think about what we could do to reduce the barrier to getting training when you need it, and how micro-learning could be implemented into your workflow in a more seamless way.

Interested in more?

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

Secure Code Warrior is here for your organization to help you secure code across the entire software development lifecycle and create a culture in which cybersecurity is top of mind. Whether you’re an AppSec Manager, Developer, CISO, or anyone involved in security, we can help your organization reduce risks associated with insecure code.

Book a demo
Share on:
Author
Matias Madou, Ph.D.
Published Jul 01, 2020

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

Matias is a researcher and developer with more than 15 years of hands-on software security experience. He has developed solutions for companies such as Fortify Software and his own company Sensei Security. Over his career, Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon.

Matias holds a Ph.D. in Computer Engineering from Ghent University, where he studied application security through program obfuscation to hide the inner workings of an application.

Share on:

Think about the last time you were at work, perhaps in a software project team working to an impossible deadline. And then, your manager comes along and says there is some mandatory security training to do, and that it needs to be shoehorned into your workday on top of everything else.

They know it, and you know it. It's a huge PITA, but for compliance reasons, you'll be playing some boring training videos in the background while you keep coding, tuning in and out of both tasks and giving your full attention to neither. This is a common scenario; it's highly disruptive, and it wastes everyone's time. Most security training is too generic, and it's easy to ignore something that bounces in and out of a workday with no real value.

As a company, our goal is to bring a better, more effective type of security training to you, and this is born from knowing exactly what it's like to be disengaged from what the AppSec team tells you is important, when each of your priorities is misaligned. What is interesting, though, is that we started to think about what we could do to reduce the barrier to getting training when you need it - even with our full platform, there are a few steps involved that take you away from your work, at moments where you still need a helpful push but can't dedicate a block of concentration to a training session.

We looked at how micro-learning could be implemented into your workflow, in the IDE or issue tracker, in a more seamless way. And this is what we came up with:

This is based on Just-in-Time (JiT) principles, wherein you're served the right knowledge, at the right time for it to be immediately effective and useful. It's the opposite of the just in case approach to learning, which is often a state of information overload that takes away precious time and headspace for building features.

Quality code is secure code, and if you need a non-invasive security sidekick to collaborate with occasionally, then it might be worth your while to take it for a test drive.

Eliminate the barriers, and bring the training to you.

Cybersecurity might be an interest for some, but not everyone. And no-one should expect developers to become security experts - that still remains the job of specialist AppSec teams. However, security-aware developers are revered for their skills, and the protection they can offer organizations right from the code-building stage. It's a position in high demand, and you can build the foundations over time with contextual micro-learning.

Now, if you're thinking about integrated training as more like Clippy (may he rest in peace), then it's important to note that in the case of Secure Code Warrior's integrations, they're built by developers for developers, so the irritation factor has been considered and obliterated.

Let's check it out in action:

Secure Code Warrior | GitHub Integration

Secure Code Warrior for Github inspects code for Common Weakness Enumeration (CWE) or OWASP references in the labels, issue title, and body of issues to display contextual just-in-time training. The way it works is if a vulnerability reference is found, a comment will be posted on the issue to assist in swift resolution and prevention of recurring vulnerabilities. It integrates with the issue without disruption of your process, or making you jump through hoops for a solution.

And if you use Jira, the process is similar:

SCW for Jira Server
SCW for Jira Cloud

Now, for the incumbent security-aware superstars, it's important to remember that it's not all on you to make magic happen. You're going to need support, training, and a reason to take security seriously and get it into your own workflow. Luckily, this is all part of a functioning DevSecOps process, and lots of organizations are already taking note. Why not get a head start?

Download them now, and let us know what you think.

View Resource
View Resource

Fill out the form below to download the report

We would like your permission to send you information on our products and/or related secure coding topics. We’ll always treat your personal details with the utmost care and will never sell them to other companies for marketing purposes.

Submit
To submit the form, please enable 'Analytics' cookies. Feel free to disable them again once you're done.

Think about the last time you were at work, perhaps in a software project team working to an impossible deadline. And then, your manager comes along and says there is some mandatory security training to do, and that it needs to be shoehorned into your workday on top of everything else.

They know it, and you know it. It's a huge PITA, but for compliance reasons, you'll be playing some boring training videos in the background while you keep coding, tuning in and out of both tasks and giving your full attention to neither. This is a common scenario; it's highly disruptive, and it wastes everyone's time. Most security training is too generic, and it's easy to ignore something that bounces in and out of a workday with no real value.

As a company, our goal is to bring a better, more effective type of security training to you, and this is born from knowing exactly what it's like to be disengaged from what the AppSec team tells you is important, when each of your priorities is misaligned. What is interesting, though, is that we started to think about what we could do to reduce the barrier to getting training when you need it - even with our full platform, there are a few steps involved that take you away from your work, at moments where you still need a helpful push but can't dedicate a block of concentration to a training session.

We looked at how micro-learning could be implemented into your workflow, in the IDE or issue tracker, in a more seamless way. And this is what we came up with:

This is based on Just-in-Time (JiT) principles, wherein you're served the right knowledge, at the right time for it to be immediately effective and useful. It's the opposite of the just in case approach to learning, which is often a state of information overload that takes away precious time and headspace for building features.

Quality code is secure code, and if you need a non-invasive security sidekick to collaborate with occasionally, then it might be worth your while to take it for a test drive.

Eliminate the barriers, and bring the training to you.

Cybersecurity might be an interest for some, but not everyone. And no-one should expect developers to become security experts - that still remains the job of specialist AppSec teams. However, security-aware developers are revered for their skills, and the protection they can offer organizations right from the code-building stage. It's a position in high demand, and you can build the foundations over time with contextual micro-learning.

Now, if you're thinking about integrated training as more like Clippy (may he rest in peace), then it's important to note that in the case of Secure Code Warrior's integrations, they're built by developers for developers, so the irritation factor has been considered and obliterated.

Let's check it out in action:

Secure Code Warrior | GitHub Integration

Secure Code Warrior for Github inspects code for Common Weakness Enumeration (CWE) or OWASP references in the labels, issue title, and body of issues to display contextual just-in-time training. The way it works is if a vulnerability reference is found, a comment will be posted on the issue to assist in swift resolution and prevention of recurring vulnerabilities. It integrates with the issue without disruption of your process, or making you jump through hoops for a solution.

And if you use Jira, the process is similar:

SCW for Jira Server
SCW for Jira Cloud

Now, for the incumbent security-aware superstars, it's important to remember that it's not all on you to make magic happen. You're going to need support, training, and a reason to take security seriously and get it into your own workflow. Luckily, this is all part of a functioning DevSecOps process, and lots of organizations are already taking note. Why not get a head start?

Download them now, and let us know what you think.

Access resource

Click on the link below and download the PDF of this resource.

Secure Code Warrior is here for your organization to help you secure code across the entire software development lifecycle and create a culture in which cybersecurity is top of mind. Whether you’re an AppSec Manager, Developer, CISO, or anyone involved in security, we can help your organization reduce risks associated with insecure code.

View reportBook a demo
Download PDF
View Resource
Share on:
Interested in more?

Share on:
Author
Matias Madou, Ph.D.
Published Jul 01, 2020

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

Matias is a researcher and developer with more than 15 years of hands-on software security experience. He has developed solutions for companies such as Fortify Software and his own company Sensei Security. Over his career, Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon.

Matias holds a Ph.D. in Computer Engineering from Ghent University, where he studied application security through program obfuscation to hide the inner workings of an application.

Share on:

Think about the last time you were at work, perhaps in a software project team working to an impossible deadline. And then, your manager comes along and says there is some mandatory security training to do, and that it needs to be shoehorned into your workday on top of everything else.

They know it, and you know it. It's a huge PITA, but for compliance reasons, you'll be playing some boring training videos in the background while you keep coding, tuning in and out of both tasks and giving your full attention to neither. This is a common scenario; it's highly disruptive, and it wastes everyone's time. Most security training is too generic, and it's easy to ignore something that bounces in and out of a workday with no real value.

As a company, our goal is to bring a better, more effective type of security training to you, and this is born from knowing exactly what it's like to be disengaged from what the AppSec team tells you is important, when each of your priorities is misaligned. What is interesting, though, is that we started to think about what we could do to reduce the barrier to getting training when you need it - even with our full platform, there are a few steps involved that take you away from your work, at moments where you still need a helpful push but can't dedicate a block of concentration to a training session.

We looked at how micro-learning could be implemented into your workflow, in the IDE or issue tracker, in a more seamless way. And this is what we came up with:

This is based on Just-in-Time (JiT) principles, wherein you're served the right knowledge, at the right time for it to be immediately effective and useful. It's the opposite of the just in case approach to learning, which is often a state of information overload that takes away precious time and headspace for building features.

Quality code is secure code, and if you need a non-invasive security sidekick to collaborate with occasionally, then it might be worth your while to take it for a test drive.

Eliminate the barriers, and bring the training to you.

Cybersecurity might be an interest for some, but not everyone. And no-one should expect developers to become security experts - that still remains the job of specialist AppSec teams. However, security-aware developers are revered for their skills, and the protection they can offer organizations right from the code-building stage. It's a position in high demand, and you can build the foundations over time with contextual micro-learning.

Now, if you're thinking about integrated training as more like Clippy (may he rest in peace), then it's important to note that in the case of Secure Code Warrior's integrations, they're built by developers for developers, so the irritation factor has been considered and obliterated.

Let's check it out in action:

Secure Code Warrior | GitHub Integration

Secure Code Warrior for Github inspects code for Common Weakness Enumeration (CWE) or OWASP references in the labels, issue title, and body of issues to display contextual just-in-time training. The way it works is if a vulnerability reference is found, a comment will be posted on the issue to assist in swift resolution and prevention of recurring vulnerabilities. It integrates with the issue without disruption of your process, or making you jump through hoops for a solution.

And if you use Jira, the process is similar:

SCW for Jira Server
SCW for Jira Cloud

Now, for the incumbent security-aware superstars, it's important to remember that it's not all on you to make magic happen. You're going to need support, training, and a reason to take security seriously and get it into your own workflow. Luckily, this is all part of a functioning DevSecOps process, and lots of organizations are already taking note. Why not get a head start?

Download them now, and let us know what you think.

Table of contents

Download PDF
View Resource
Interested in more?

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

Secure Code Warrior is here for your organization to help you secure code across the entire software development lifecycle and create a culture in which cybersecurity is top of mind. Whether you’re an AppSec Manager, Developer, CISO, or anyone involved in security, we can help your organization reduce risks associated with insecure code.

Book a demoDownload
Share on:
Resource hub

Resources to get you started

More posts
Resource hub

Resources to get you started

More posts