Updated: 24 November 2022
I am delivering training courses on how to build effective processes around application security scanning tools as part of my work for Bounce Security. The course’s official name is “Building a High-Value AppSec Scanning Programme” and it’s unofficial, more fun but less descriptive name is “Tune your Toolbox for Velocity and Value”. This post will serve as a way of getting more information about the course.
The easiest way to attend this course right now is to sign-up for the public, in-person, two day session which I am running at Global AppSec Dublin 2023. For registration see here or more details on the conference are here.
You can see some feedback from the one day virtual and two day in-person courses which we ran in June and November, lower down this page.
Alternatively, you are welcome to get in touch with me to discuss private training by Bounce Security via email (info <at> bouncesecurity.com) or via Twitter.
Index of information
- Text about the course
- Audio/Visual information about the course
- How can I attend this training course?
Text about the course
You bought the application security tools, you have the findings, but now what? Many organisations find themselves drowning in “possible vulnerabilities”, struggling to streamline their processes and not sure how to measure their progress.
This is a topic I have had significant experience with over the last several years providing application security consulting and “on the ground” assistance to various organisations. This has exposed me to a variety of these tools and several ways of working with them, seeing what works and what does not in different contexts.
Being a consultant means I have no vendor allegiance or commitment and allows me to discuss useful war stories (both successful and less successful) without disclosing sensitive client/employer information.
From seeing these organisations and discussing in various forums, this problem certainly seems to resonate and training like this would fill a gap that urgently needs to be addressed. Companies are being told that they need to improve their application security posture and that more tools are the key to doing this efficiently. However, it is becoming clear that without effective processes and strategies for working with these tools, they quickly become a burden and a blocker.
In this course you will learn how to address these problems and more (in a vendor-neutral way), with topics including:
- What to expect from these tools?
- Customising and optimising these tools effectively
- Building tool processes which fit your business
- Automating workflows using CI/CD without slowing it down.
- Showing the value and improvements you are making
- Faster and easier triage through smart filtering
- How to focus on fixing what matters and cut down noise
- Techniques for various alternative forms of remediation
- Building similar processes for penetration testing activities.
- Comparison of the different tool types covered.
To bring the course to life and let you apply what you learn, you will work in teams on table-top exercises where you design processes to cover specific scenarios, explain and justify your decisions to simulated stakeholders and practice prioritising your remediation efforts.
For these exercises, you will work based on specially designed process templates (which we will provide) which you can use afterwards to apply these improvements within your own organisation.
Be ready to work in a group, take part in discussions and present your findings and leave the course with clear strategies and ideas on how to get less stress and more value from these tools.
Feedback so far
We ran a 1 day version of the course focussing on SCA and SAST virtually at OWASP Global AppSec EU 2022 and a 2 day in-person version of the course which included SCA, SAST, DAST and pen testing at OWASP Global AppSec San Francisco 2022. Both sessions went great! Feedback included everyone feeling they had achieved their desired learning outcomes and all attendees responding “Very satisfied” or “Somewhat satisfied” when asked about the Instructor, the Course slides, the Group Exercises and the Course Content.
Attendee comments included:
“On target good advice on taking the next steps in SCA and SAST.“
“For me it was the perfect input to structure the ideas we already have in our sast introduction journey.“
“Good high level overview of the space and a primer on what to reasonably expect when one implements a program in their business.“
“The group work was exciting to work through and instructor did good (sic) with questions.“
We are excited to expand with more content and broader exercises in upcoming longer versions!
Audio/Visual information about the course
For those of you who prefer to hear their information rather than read it, here are some useful resources.
Elevator pitch for the course ~2 minutes
In this short video, I give a quick explanation of the course and the ideas around it. Transcript in the original LinkedIn post.
Discussion of the background to the course – ~40 minutes
In this interview with the Application Security Podcast, I talk through the background to the course including where the idea came from and the key takeaways and ideas I want people to get from the course.
Sample 1 of the course material – SCA Deep Dive ~ 55 mins
This is an example of some of the course content albeit pushed together in a less interactive way. The course itself has more discussion and exercises interspersed. This particular session was a deep-dive on Software Composition Analysis (SCA).
Sample 2 of the course material – Quick-fire tips ~ 40 mins
This was a talk I did at DevSecCon24 which was designed to be a few quick examples of efficiency tips for SCA and SAST. In the full training course there are far more suggestions and there is much more time to explain, discuss and practice them.
How can I attend this training course?
OWASP Global AppSec Dublin 2023
Following the positive feedback from the successful one-day and two-day versions of the course at previous Global AppSec conferences, I’m honoured to have been asked back AGAIN, this time to deliver the two-day version, in-person at OWASP’s flagship conference in the EU in February. The similar event in the US in November was fantastic and I would expect this one to be as well.
You can read my thoughts on why the Global AppSecs are great conferences in this older blog post!
I am honoured to be listed in the legendary Jim Manico’s training catalogue. Jim’s catalogue is primarily aimed at organisations arranging training for their employees and has a variety of top-class taught training courses. I strongly recommend that anyone looking for the best application and cloud security training takes a close look at what is on offer.
The full training catalogue can be found on the Manicode website and the extracts for my Tools course are below. (I also have an ASVS course available which you can see in the catalogue as well 😀!)
To find out more and how to arrange, you can get in touch with Jim via the Manicode website or get in touch with us directly via info <at> bouncesecurity.com.
To be confirmed but stay tuned!