LeanAppSec Live
On-Demand
Watch the May 2025 edition of LeanAppSec Live featuring speakers from Rippling, Endor Labs, and Absolute AppSec.
The Agenda
Being an AppSec Engineer in the Age of AI
How is the job changing, and what’s staying the same?
Most organizations expect security engineers to have expertise in security-specific topics, but as Jeevan Singh (Director of Security Engineering, Rippling) will tell us, that’s just a baseline to drive your career forward. In this session, we’ll discuss:
- The relevance of technical skills in AppSec and software development
- The need for influencing and program management tactics
- What’s changing now that AI is part of daily life
Vibe Coding = Mid Security
How secure is AI-generated code?
Tools like Base44, Cursor, and Vercel make it easy for anyone to write code. But as Endor Labs co-founder and CTO Dimitri Stiliadis will demonstrate, that doesn’t mean anyone can generate secure code. We’ll cover:
- What happens when you scan AI-generated code
- Fixing vulnerabilities
- Impact on AppSec programs
Modern Security Code Reviews
Do your scanners find every risk? (No!)
As a long-time practitioner and instructor of a proven process for conducting secure code reviews, Absolute AppSec co-host Seth Law shares effective strategies for implementing a code review methodology. Topics will include:
- A general overview of what a secure code review should look like
- Use of Generative AI and LLMs during code reviews
- Identification and prioritization of application risks based on code metadata
More Resources

Explore how to successfully shift security left by implementing strategies that make secure coding practices easy for developers, automate non-core engineering tasks (the "outer loop"), and build trust by only prioritizing security findings that are truly important and relevant.

Adam Shostack is one of the best known thought leaders and instructors in threat modeling. At the October 2025 LeanAppSec Live, we invited him to deliver a lightning talk on the four question framework.
Discover how to efficiently incorporate threat modeling into your security processes without extra budget or headcount.



