Tag Archive for: david

Luukas Ilves, Gulsanna Mamediieva, and David Eaves, with Vice Prime Minister of Ukraine Mykhailo Fedorov


David: Ukraine offers a window into a collective future about how we might face the coming crises. Ukraine happens to be facing an existential crisis created by an illegal war committed by its neighbor, but all countries are facing climate change crises, financial crises, and possible future pandemics. So, a country’s responsive capacity – Sana talked about her government’s resilience – to those things is going to be core to determining trust in government. If we want democracies to survive, they have to perform well. We need digital-era governments to respond to 21st-century problems. That means having the flexibility and the capacity to be able to do that. That’s what the Estonians have and it’s what the Ukrainians are showing us: how digital fits into that capacity building. For me, a big takeaway from the convening was how much climate change is going to drive this need. If there are going to be 10 million internationally displaced people in 50 countries around the world over the next 20 years, we’re going to need some capacity to serve those people when they lose their houses and are roaming around your country. The only way a country is going to be able to do that is if it has a digital solution.

Luukas: We hope these stories are inspiring for people interested in digital public infrastructures. Many countries in the world tend to be very pessimistic about the public sector’s capacity to do these things. That becomes a self-fulfilling prophecy. The most important thing is, whatever your position, be demanding of your government. Because there’s no inherent law that says the government has to be bad at technology. The more positive pressure there is from the people to do better, the greater the country’s chances of success.

Sana: I’d encourage people to find energy and inspiration in democracy. Citizens should have higher expectations from the government for the services that they receive. Especially in terms of convenience and user experience. But for those people who work specifically in this sphere, it requires a lot of energy, persistence, and flexibility to overcome obstacles. What I took from the convening was that everyone, on every level, has to…

Source…

Cybersecurity Insights with Contrast CISO David Lindner | 12/23


David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.

Source…

Cybersecurity Insights with Contrast CISO David Lindner | 10/28


Insight #1


CVSS score does not directly relate to the risk to your organization. Please for everyone’s sake, including your developers, produce a better algorithm for managing risk in your organization. Look at things like exploitability (EPSS), exploit path, vulnerable class usage, etc.”

 

Insight #2


The security industry is known to overreact to new CVEs, especially when they are rate critical. It’s a lot easier to tweet or blog about something than it is to drop everything you are working on to try to figure out how to update the library that is vulnerable to said CVE. How do we do that you ask? See my first insight from this week, find a better algorithm that fits your organization that mirrors your risk profile and tolerance.”

 

Insight #3


If you are reporting vulnerabilities as “actively exploited” or “in the wild” please define what that means to the broader community. Those terms are created to scare people into compliance but have no real backing or understanding of anything about what it means. Transparency is key, this is not transparency.”

*** This is a Security Bloggers Network syndicated blog from AppSec Observer authored by David Lindner, Director, Application Security. Read the original post at: https://www.contrastsecurity.com/security-influencers/cybersecurity-insights-with-contrast-ciso-david-lindner-10/28

Source…

Cybersecurity Insights with Contrast CISO David Lindner | 10/21


David Lindner, Chief Information Security Officer

David is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, to application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.

Source…