LeanAppSec Live

On-Demand

This event aired Feb 19, 2025
Format
Virtual Conference
DATE
February 19, 2025
TIME
DURATION
2 hours

Watch the February 2025 edition of LeanAppSec Live featuring speakers from Peloton, OWASP, and Relativity.

The Agenda

Sri Manda
CISO at Peloton
Session 1

Show Your CISO that AppSec Matters

Does your CISO understand the value of your AppSec program?

Special guest Sri Manda, CISO of Peloton, will give insider insights on how to communicate better with your CISO.  Learn actionable strategies to establish the value of AppSec, including:

  • Identify business problems with data
  • Build a business case to change tooling
  • Use metrics to drive decision making and track progress
  • Emerging metrics
Steve Wilson
Project Leader for OWASP Top 10 for LLM Applications at OWASP
Session 2

Your Devs are Using LLMs…Now What?

Are your developers using LLMs? (That’s a rhetorical question)

We’ll hear from someone who literally wrote the book on LLM security: Steve Wilson, Chief Product Officer of Exabeam. He’s the project leader for OWASP Top 10 for Large Language Model AI Application and author of The Developer’s Playbook for Large Language Model Security.

In his session, Steve will talk about 6 things you can to ensure devs are safely leveraging AI:

  • Limiting your domain
  • Knowledge management
  • Zero trust
  • Managed supply chain
  • Building an AI red team
  • Continuous monitoring
Raphael Theberge
Director of Security Enablement at Relativity
Session 3

Help Devs Make Good Security Decisions

Do you dream about developers doing the right thing for product security?

At Relativity, Raphael Theberge (Director of Security Enablement) and his team made that dream a reality. Hear about how they created a process to empower developers to block vulnerabilities before code is deployed, and they automated validation of those decisions. Better security, less toil. In his session, Raphael will share:

  • How they confirm that a risk is ok to accept
  • When to engage to make sure a risk remediated appropriately
  • How to create organization-wide accountability for product security

More Resources

Shifting Left, Done Right
Blog
Shifting Left, Done Right

Explore how to successfully shift security left by implementing strategies that make secure coding practices easy for developers, automate non-core engineering tasks (the "outer loop"), and build trust by only prioritizing security findings that are truly important and relevant.

The Four Question Framework for Threat Modeling
Video
The Four Question Framework for Threat Modeling

Adam Shostack is one of the best known thought leaders and instructors in threat modeling. At the October 2025 LeanAppSec Live, we invited him to deliver a lightning talk on the four question framework.

Discover how to efficiently incorporate threat modeling into your security processes without extra budget or headcount.

Mythbusters: Are Tech Industry Analysts Worth Listening To?
Video
Mythbusters: Are Tech Industry Analysts Worth Listening To?

Learn how a tech industry analyst could help you research new tools or practices.