LeanAppSec Live

On-Demand

This event aired Oct 15, 2025
Format
Virtual Conference
DATE
October 15, 2025
TIME
9am-11am PT
DURATION
2 hours

Watch the October 2025 edition of LeanAppSec Live featuring speakers from Adobe, IDC, and Shostack & Associates.

LeanAppSec Live Oct 2025 Cover

The Agenda

Adam Shostack
President at Shostack & Associates
Session 1

The Four Question Framework for Threat Modeling

Whether you’re a security engineer, developer, or product manager, threat modeling is essential for identifying potential threats in whatever you're working on. We’re bringing in threat modeling expert Adam Shostack (author of Threats: What Every Engineer Should Learn from Star Wars) to share how his Four Question Framework promotes inclusive, collaborative security discussions. You’ll learn how to use each of the questions:

  • What are we working on?
  • What can go wrong?
  • What are we going to do about it?
  • Did we do a good job?
Ammar Alim
Senior Manager, DevSecOps at Adobe
Session 2

4 Ways to Use AI for Security Engineering

In this session, you’ll get an inside look at how a DevSecOps team is using AI/ML to revolutionize their WAF rule management program. Ammar Alim (Senior Manager, DevSecOps @ Adobe) shares how they’re leveraging existing resources to dynamically create, deploy, and refine WAF rules without requiring new tools or increased budget.

  • Use ML and a LLM to analyze traffic and dynamically generate new WAF rules
  • Store rules and outcomes in a RAG to inform future analyses 
  • Create MCP servers to bring in WAF and Terraform docs, and AppSec scanning
  • Where to keep a human in the loop
Katie Norton
Research Manager at IDC
Session 3

Mythbusters: Are Analysts Worth Listening To?

When you’re researching new tools, it can be hard to separate hype from reality. In this session, analyst Katie Norton (Research Manager @ IDC) talks about how you can use an analyst as part of your research strategy, and we’ll confirm or bust common myths about analysts, including:

  • Are they truly unbiased?
  • Do they just exist to coin new categories?
  • How do they know if a product actually works?

More Resources

Shifting Left, Done Right
Blog
Shifting Left, Done Right

Explore how to successfully shift security left by implementing strategies that make secure coding practices easy for developers, automate non-core engineering tasks (the "outer loop"), and build trust by only prioritizing security findings that are truly important and relevant.

The Four Question Framework for Threat Modeling
Video
The Four Question Framework for Threat Modeling

Adam Shostack is one of the best known thought leaders and instructors in threat modeling. At the October 2025 LeanAppSec Live, we invited him to deliver a lightning talk on the four question framework.

Discover how to efficiently incorporate threat modeling into your security processes without extra budget or headcount.

Mythbusters: Are Tech Industry Analysts Worth Listening To?
Video
Mythbusters: Are Tech Industry Analysts Worth Listening To?

Learn how a tech industry analyst could help you research new tools or practices.