12:00 PM - 12:30 PM (PST)
What Happens After You Shift Security Left?

Cybersecurity maturity comes from a continuous process focused on iteration rather than security revolutions. You’ll always find something to improve on. This is to be somewhat expected. But some of the best cybersecurity teams do something different. Innovate. To decompose why this is, the presenter covers a few basic areas:The two of the most common attack vectors for organizations and the importance of threat modeling: inside out and outside in. Establishing a continuous improvement process founded with threat modeling (hint: sustainable and consistent cybersecurity program growth). Defining what it means to be an innovative cybersecurity leader and how to get started. Digging into why vulnerability class elimination becomes an outcome of continuous improvement and innovation.