Webinar - Shifting Left: How to Develop Software Securely? Secure SDLC Explained


On 11 February 2021, our Tools & Innovation Manager Robert Meppelink & Senior Account Manager Heiko Schoonhoven organized the webinar: "Shifting Left - How to Develop Software Securely? Secure SDLC Explained".

Did you miss this webinar? The webinar recording can be viewed here. If you have further questions, please contact info@secura.com. Curious about our past or upcoming webinars? Please click here to find a full overview of our webinars.


About the webinar

Building software can be challenging. Getting your software out the door quickly, while it's usable and at the same time ensuring quality and performance, puts pressure on software development teams. The growing need for secure software products over the last years does not make this easier. A well-organized development process is key to keeping the software you deliver aligned to your business needs, and security needs to be part of that. Building software is a true team effort and requires different roles. Whether you are involved in building software as a developer, architect, product owner, tester, scrum master or otherwise, we are all part of the same process.

In this webinar we looked at the benefits of 'shifting left': dealing with security earlier in the process. We discussed how the OWASP software architecture maturity mode (SAMM) can help to determine what to do first, and we will explained how threat modeling can help to make security a more measurable and testable part within the development life-cycle. We ended the webinar with some tips to get started.

Intended Audience

  • Software Developers
  • Software Architects
  • Product Owners
  • Product Testers


If you are part of a software development team, or interested in building software securely, this webinar is for you.
We did not dive into application code or explain vulnerabilities here, but focused on the process and the activities of secure software development.

Agenda

  1. The benefits of shifting left
  2. OWASP SAMM – An overview and quick wins
  3. Threat modeling & ASVS to make security more actionable
  4. How to get started
  5. Q&A