![Exploring Information Security - Timothy De Block artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/84/29/51/84295189-be45-6393-dff0-d1c88562822a/mza_8734206876391622689.jpg/100x100bb.jpg)
What are the steps to secure application development?
Exploring Information Security - Timothy De Block
English - July 31, 2017 00:00 - 23 minutes - 26.9 MB - ★★★★★ - 42 ratingsTechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Jim (@manicode) is an active member in the application security field. He's been a board member for OWASP. He's a regular speaker at OWASP conferences and he provides appsec training nine months out of the year. I recently had the opportunity to tune into a webinar put on my Jim discussing the steps to secure application development. He's got a wealth of knowledge and provides actionable advice for anyone wanting to move in that direction.
In this getting started episode of the Exploring Information Security podcast, Jim Manico joins me to discuss the steps (or rather phases) to secure application development.
Jim (@manicode) is an active member in the application security field. He's been a board member for OWASP. He's a regular speaker at OWASP conferences and he provides appsec training nine months out of the year. I recently had the opportunity to tune into a webinar put on my Jim discussing the steps to secure application development. He's got a wealth of knowledge and provides actionable advice for anyone wanting to move in that direction.
In this episode we discuss
How Jim got started in appsecWhy secure application development is importantWhat the steps are to get startedWho should be implementing application security